AppSec and Penetration Testing specialist. Former Comcast & Temenos. Open to full-time roles in the UK and remote globally.
I'm a Security Engineer with 5+ years of experience across application security, penetration testing, and offensive security, working across enterprise environments, fintech, and now OT/IoT-aligned systems.
I hold an MSc in Cyber Security Engineering from the University of Warwick, an NCSC Certified degree, and am a Licensed Penetration Tester (LPT). My background spans secure code reviews, threat modelling, DevSecOps integration, and hands-on offensive testing across web, API, and industrial environments.
Open to full-time roles in Application Security, Penetration Testing, or Offensive Security across the UK.
5+ years securing applications at enterprise scale across telecoms, fintech, and security consulting. Now based in the UK.
Formal grounding in cybersecurity engineering and computer science.
Dissertation: Designed and evaluated a hybrid intrusion detection framework incorporating structured threat modelling, attack simulation, and risk-based security evaluation.
Foundation in computer science, algorithms, and software engineering principles that underpin current security engineering practice.
What I do and the tools I use to do it, across offensive security, application security, and engineering.
Industry-recognised certifications demonstrating hands-on offensive and defensive security capability.
Security research and engineering projects, built in public and shared with the community.
A lightweight hybrid intrusion detection system for connected vehicles. Simulates five real-world CAN bus attacks, comparing rule-based and machine learning approaches. Achieves 98% accuracy with 2.1ms detection latency.
Designed and implemented a secure corporate network for Tech Zolutions Inc. Covers VLANs, OSPF routing, ZPF firewall, extended ACLs, site-to-site IPsec VPN and TACACS+ AAA. Simulated in Cisco Packet Tracer.
A practical toolkit to automate reconnaissance and basic web security testing. Includes subdomain enumeration, port scanning, directory brute forcing, JavaScript analysis, and automated report generation. Designed to streamline repetitive tasks during security assessments.
Building security knowledge and culture beyond the day job, through community, mentorship, and open-source contribution.
Founder and lead of Rootecstak, a 500+ member cybersecurity community organising hands-on workshops, CTF events, and technical seminars. Actively mentor beginners and early-career professionals in building practical security skills and launching cybersecurity careers.
Delivered 50+ security talks and hands-on workshops covering application security, threat modelling, and DevSecOps practices. Audiences include enterprise engineering teams, universities, and industry conferences.
Support aspiring and mid-career security professionals transitioning into product and application security roles through structured career guidance, hands-on technical coaching, and mock technical interviews.
Chapter Leader of the OWASP Cuddalore Chapter, organising local meetups, security awareness events, and hands-on sessions to grow the security community at the grassroots level.
I'm available for Guest Lectures, Workshops, Student Mentoring, and conversations around Community Building in Cybersecurity — whether at universities, bootcamps, or industry events. If you're organising something and think I'd be a good fit, I'd love to hear from you.
Continuous skill development through offensive security platforms and real-world machine exploitation labs.
Hands-on offensive and defensive security labs covering web exploitation, network pentesting, OSINT, and red team techniques.
Real-world machine exploitation and challenge labs focused on penetration testing techniques and CTF problem solving.
Hands-on web security labs covering SQL injection, XSS, CSRF, authentication flaws, access control, and more. Built by the creators of Burp Suite.
Engaging with the security community through major industry conferences, summits, and practitioner-led events.
Practical perspectives on application security, threat modelling, and building secure engineering cultures.
Most security practitioners spend their careers in IT environments. Industrial Control Systems operate by completely different rules, with different protocols, different risk priorities, and real physical consequences when things go wrong.
My experience earning the Certified Red Team Analyst (CRTA) from CyberWarFare Labs, covering Active Directory exploitation, exam tips, practice rooms, and honest thoughts on whether it's worth it.
UK startups need to move fast while meeting GDPR and NIS Regulations. Here's how to build security into your SDLC without killing velocity, from threat modelling to CI/CD scanning.
Most threat modelling exercises are too academic to survive contact with real engineering timelines. Here's a lean, attacker-informed STRIDE process that fits inside a sprint and still catches what matters.
Recommendations from industry leaders, professors, and the security community.
Rakesh is one of the most inspiring personalities I have come across in the cybersecurity space. He is not just a cybersecurity professional. He is a deep researcher with exceptional command over both offensive and defensive security domains. His ability to dive deep into complex security challenges, break them down, and produce meaningful research is truly remarkable. Through ROOTECSTAK and his various community initiatives, he has been a core driving force behind creating an active, vibrant cybersecurity community in Chennai.
Mr. Rakesh is an enthusiastic student since the day I got connected with him when he was playing a technical role in the CSI chapter. He was very keen in the Security domain and had done a good number of projects. He is very active and ready to contribute to the students community. I have admired his commitment, dedication and mentoring the students in the Security domain.
Podcast appearances, video interviews, and media features covering cybersecurity, community building, and the security industry.
Open to relocation within the UK for Application Security, Penetration Testing, and Offensive Security roles. Resume available on request. Let's connect.