Security Consultant

New Delhi, India

Profile image for Aakash Kumar Goel

Aakash started his career in secure software development and has been contributing to the security industry for more than 5 years. He is an active member of local security communities in India (including null, DEFCON and OWASP).

He is currently a consultant at Security Compass's offices in India where he specializes in application and infrastructure security. Aakash holds a graduate engineering degree in computer science.

Areas of Expertise:
Advisory Services
  • Application Risk Profiling
  • Agile Security Advisory
  • Software Development Life Cycle (SDLC) Gap Analysis and Best Practices
  • Phishing and Employee Awareness Campaigns
  • Periodic Security Assessments & Delta Analysis Program
Verification Services
  • Architecture Review and Threat Modelling
  • Web Application Security Assessment
  • Mobile Application Security Assessment
  • Desktop Application Security Assessment
  • Source Code Review
  • Vulnerability Triaging for Static and Dynamic Analysis Results
  • Network Security Assessment
  • Red Team, Blue Team & Purple Team Exercises
  • Phishing Simulation
  • Financial Services
  • Technology
  • Telecom

B. Tech - Computer Science
Uttar Pradesh Technical University
Lucknow, Uttar Pradesh, India

Advanced Business Computing
Centre for Development of Advanced Computing (C-DAC)
Hyderabad, Telangana, India

  • Automated Session Fixation Vulnerability Detection in Web Applications using the Set-Cookie HTTP response header in cookies (SINCONF 2014, University of Glasgow, UK) read
  • Automation of Detection of Security Vulnerabilities in Web Services using Dynamic Analysis (ICITST 2014, London, UK) read
  • Layer 8 Exploitation - A Threat to National Security (2012) read
    • Layer 8 Exploitation, better known as Social Engineering is a threat, often overlooked but regularly exploited; to take advantage of what has long been considered the 'weakest link' in the security chain of an organization – the 'human factor'.
Events & Associations:
  • International Cyber Security and Policing Conference
Back to Our People

Contact Us

You’re different, and we know it.

We are your guide to planning, assessing, and helping you build secure information systems to keep your business productive.

Contact us to find out how we can help you.

Some of
(Choose One)
(All that apply)
Web Search
Online Ad
White Paper
Analyst Report
Trade Show
Worked With Us Elsewhere

Security Compass Logo