Gagan Jain Bommaiah Satish, Chief Technical Officer

Gagan Jain Bommaiah Satish

Chief Technical Officer

CyberSafe Bangalore

Location
India - Bengaluru
Education
Master's degree, Information Securityy
Experience
8 years, 0 Months

Share My Profile

Block User


Work Experience

Total years of experience :8 years, 0 Months

Chief Technical Officer at CyberSafe Bangalore
  • India - Bengaluru
  • My current job since November 2017

Cyber Safe Bangalore logo
Chief Technology OfficerChief Technology Officer
Cyber Safe · Full-timeCyber Safe · Full-time
Nov 2017 - Present · 5 yrs 10 mosNov 2017 - Present · 5 yrs 10 mos
Bengaluru Area, IndiaBengaluru Area, India
As the CTO my role is to act as the conduit between innovative technology and sustainable business success. Leveraging my expertise in cybercrime investigations, cybersecurity audits, and product life-cycle management, I am dedicated to identifying and implementing technologies that foster a competitive advantage for our company.

Key Responsibilities:
Supervise the system infrastructure to optimize functionality and efficiency, while overseeing large-scale teams and big data management.
Facilitate profitable technology usage across all departments, offering mentorship to team members for their professional growth.
Establish and maintain stringent quality assurance and data protection processes to uphold the security and integrity of our systems.
Regularly monitor KPIs and IT budgets to evaluate and enhance technological performance.
Articulate and champion our tech strategy to partners, investors, and internal teams.
Make informed executive decisions regarding the company's technological requirements, ensuring alignment with business objectives.

Technical Expertise:
OSINT techniques proficient WEBINT, SOCINT, GEOINT training and Consulting
Specialization in Cyber Crime Investigations and Cyber Security Audits, including penetration testing for web applications, mobile applications, API, and Cloud Security.
Proficiency in Source Code Review, both static and dynamic, with an emphasis on CI/CD Security.
Extensive experience in Cyber Security Training (CEH, CHFI, CND, ESCA, LPT, SECURITY+, CASP, A+, etc.) as an affiliate from ATC partner CERTFIRST.
Skilled in digital forensics, including mobile forensics, HDD forensics, Android malware analysis, and Windows/Unix/Raspberry Pi RAT's reverse malware engineering.
Proficient in using tools such as Burp Suite, OWASP ZAP, Acunetix, Netsparker, Nuclei, CobaltStrike, MobSF, Frida, Ghidra, Relativity, FTK, Axiom, Encase, Magent Forensics, DVR Examiner, OnionScan SIEM

Cyber Security Consultant at Certfirst corporation
  • United States - South Chicago
  • June 2016 to November 2017

Consulting on cybersecurity audits
Maintaining security of Web applications and perform security testing on internal systems.
Train corporates and govt sector on certifications like ECCouncil CEH, CHFI, CND, ECSA etc. Comptia CYSA, Security+

Education

Master's degree, Information Securityy
  • at Durham College
  • June 2015

BUSINESS CONTINUITY MANAGEMENT BUSINESS PROCESSES & SECURITY POLICIES, INFORMATION SECURITY NETWORK SYSTEMS & COMPONENTS ,SECURING WIRELESS NETWORKS, ACCESS CONTROLS, COMPUTER FORENSICS & DATA MINING, HACKING & EXPLOITS, LEGAL & ETHICAL COMPONENTS IN A FORENSIC INVESTIGATION, O/S & APPLICATIONS SECURITY, NETWORK MONITORING & PENETRATION TESTING, SECURITY AUDITING & GOVERNANCE

Specialties & Skills

Training
Computer Forensics
Web Intelligence
IT Security
Cyber Security
APPLICATION PROGRAMMING INTERFACE (API)
QUALITY ASSURANCE
BIG DATA
INFRASTRUCTURE
MICROSOFT OUTLOOK
BUSINESS REQUIREMENTS
RESEARCH
SCHEDULING
DATA ADMINISTRATION

Social Profiles

Personal Website
Personal Website

URL removed due to policy violation. Please contact support for further information.


Languages

English
Expert

Training and Certifications

Certified Ethical Hacker (CEH) Credential ID ECC27643816922 (Certificate)
Date Attended:
October 2019

Hobbies

  • Security Research
    Awarded thank you letter from Google, Cambridge University for finding security loopholes