Hello, my name is
Manish Pandey
CyberSecurity Consultant
Subscribe to NewsLetter
About me
I am an enthusiastic Security Consultant based in New Delhi, Bharat, with a rich experience of over a Decade+ in Application & Infrastructure Security.
I Help Assess & Protect Enterprise Products and Infrastructure
Leveraging over a decade of expertise in cybersecurity, I have refined my proficiency in discerning and responding to diverse client needs within this dynamic domain. My specialization is in aligning with the latest trends and emerging threats in cybersecurity, ensuring the delivery of avant-garde and resilient solutions. My experience spans multiple industries, positioning me as a dependable partner for your cybersecurity challenges.
Leveraging an extensive career in cybersecurity, I have navigated through a spectrum of specialties, including Application Security, Network Security, Risk Assessments, and Threat Modeling, culminating in my current expertise in architecting secure frameworks for both Cloud and On-Premise environments. My professional journey is marked by a series of successful projects that have significantly elevated digital security for a diverse clientele. With a deep reservoir of knowledge, I am positioned to present optimal, bespoke strategies addressing your unique cybersecurity challenges. My role extends beyond providing options; it involves partnering with you to meticulously select and implement the most efficacious and tailored cybersecurity practices or solutions, aligned seamlessly with your organizational objectives.
What I do
My role in enhancing your organization’s cybersecurity involves a comprehensive approach, from analyzing specific security needs to implementing tailored solutions. I focus on developing strategies that align with your business objectives, ensuring robust and scalable security that adheres to industry best practices.
Threat Modeling
Proactive approach to identify and mitigate potential security threats in software systems. It involves analyzing the architecture of an application to foresee and address security vulnerabilities before they can be exploited.
Application Security Testing
Aims to identify and remediate weaknesses before they can be exploited, ensuring the application's integrity and protecting user data.
Secure Code Review
Auditing the source code of an application to identify security vulnerabilities. It involves a thorough examination to ensure the code adheres to best practices in security, thereby mitigating the risk of future exploits.
Vulnerability management
Ongoing practice of identifying, evaluating, and mitigating security weaknesses in software and networks, essential for reducing cyber attack risks and protecting organizational assets.
Adversary Simulation
Mimic the actions and tactics of real-world attackers. This process tests an organization's defenses and response capabilities, providing valuable insights into potential security weaknesses and areas for improvement.
Cloud Security
Encompasses strategies and technologies designed to protect data and infrastructure in cloud environments, safeguarding against cyber threats and ensuring data privacy.
DevSecOps
Integrate security seamlessly into the DevOps workflow, ensuring continuous security from development to deployment. It embeds security practices into every stage of software development, enhancing overall system resilience.
Machine Learning Security
Secure machine learning systems by identifying risks, integrating defenses into data handling, model training, and deployment, to enhance trust and resilience.
Skills
My Experience
2024-Present
Security Architect
I have responsibility to Perform Security Architecture Review for Application Security, DevSecOps, Cloud Security, ML Security and Core Banking.
2021-2024
Prudent Insurance Brokers Pvt. Ltd.
Senior MANAGER
I had responsibility to Run Programs for vulnerability Management, Application Security, DevSecOps, Cloud Security and Adversary Simulation.
2014-2021
Tanishi Consultants Pvt. Ltd.
Acquisory Risk Consulting
Mahindra Special Services
Senior Associate Consultant
Managed and led Penetration Testing, Adversary Emulation, Application Security, Secure Code Review, App/Network Threat Modeling, and Threat Hunting teams.