
Ramakanth Kanchi
Hyderabad, HyderabadAbout Ramakanth Kanchi:
Ramakanth Kanchi aka RK is a Application Security Lead , Security Researcher and Founder of Gotowebsecurity.com blog
RK's expertise involves Web Application Development & Conducting Security Assessments that include Architecture Reviews, Secure Coding Practices & Penetration Testing. Through responsible disclosure he has found serious bugs & security vulnerabilities affecting various programs on Bugcrowd platform having national / global presence
In May 2018, he has been recognized as the top 2nd security researcher on bugcrowd for finding major security bugs for that month
With his expertise, he lead Application Security - Static Application Security Testing (SAST) , Dynamic Application Security Testing (DAST) , API Security tests & Penetration Testing programs for various clients & helped them achieve maturity levels to strengthen their applications & systems against attacks.
He has a very good background/understanding of Secure SDLC. In his spare time, he explores new techniques or attack vectors , compiles & exploits known security vulnerabilities, publishing articles, videos & educating a wide range of audiences via gotowebsecurity.com blog
He played key roles in developing security engagement plans, assess security tools using industry standards & identify gaps, help to implement compensating security controls.
Experience
Cyber security specialist having a total of ~11 years experience with a passion and talent for aligning security architecture, plans, controls, processes, policies and procedures with security standards and project goals.
Project leader with proven experience directing phases of projects while mentoring global team mem- bers.
Experience developing and testing security architectures of web based systems.
Introduced & implemented security assessment plans & rules of engagement.
Mapped security tools with Open Web application Security Project (OWASP) industry standards to verify
coverage & gap analysis.
Experience in reverse engineering of native android mobile applications.
Capable of simulating how an attacker would exploit the vulnerabilities.
Collaborate with developers on remediating the identified vulnerabilities.
Education
B.Tech COMPUTER SCIENCE