Jyoti Raval

Staff Product Security Engineer
,
Harness

Profile

- Author of Phishing Simulation and MPT: Pentest in Action - Presented at InfosecGirls, Nullcon, Defcon27, Blackhat Asia, HITB Singapore, OWASP NZ, Shecurity, Defcon32, Blackhat London. - OWASP Pune chapter leader - Transformational cybersecurity leader driving product security excellence and innovation. - Expertise in developing and executing comprehensive security strategies, collaborating with cross-functional teams, enabling business growth. - Discovered CVE-2019-11016, CVE-2019-20225, CVE-2020-22842 | Elgg,MyBB Hall of Fame. - GenAI security SteerCo - Product security strategy and governance - Making Product Secure end-to-end - Passionate about building secure products - Product security scorecard and matrix - Researched on improving DAST (Dynamic Application Security Testing) methodology. - Dynamic and result oriented security leader with experience in different aspects of cyber security dimensions. - Threat Modeling, Software supply chain security,Software composition analysis, Configuration Review, Secure Source Code Review, Vulnerability Assessment & Penetration Testing for Infrastructure, Web application and Mobile / Thick client application for Android, Windows and iOS. - Proficient in advance attack technique – Red Team Assessment, including the activities like physical security assessment using social engineering techniques and phishing campaigns. - Developed tools to conceptualize various cyber security techniques. - Assisting customers achieve success in their application security programs. - Authored blogs at Qualys,Harness - https://github.com/jenyraval/Phishing-Simulation - https://www.defcon.org/html/defcon-27/dc-27-demolabs.html#Phishing%20Simulation - https://www.blackhat.com/asia-20/arsenal/schedule/index.html#phishing-simulation-assessment-18906 - https://conference.hitb.org/hitbsecconf2022sin/session/mpt-pentest-in-action/ - https://blog.qualys.com/news/2019/12/11/cve-2019-11016-open-redirect-vulnerability - https://blog.qualys.com/vulnerabilities-threat-research/2021/10/27/apache-tomcat-http-request-smuggling-vulnerability-cve-2021-33037 - https://www.harness.io/blog/harness-api-testing-methodology - https://www.harness.io/blog/the-threat-modeling-process - https://defcon.org/html/defcon-32/dc-32-demolabs.html#54195