Prashant P. looks like a good fit?

We can organize an interview with Aldin or any of our 25,000 available candidates within 48 hours. How would you like to proceed?

Schedule Interview Now

Prashant P. Security, Compliance and Cybersecurity Platforms

My name is Prashant P. and I have over 1 year of experience in the tech industry. I specialize in the following technologies: Information Security, Computing & Networking, Compliance, Cybersecurity Management, Information Security Awareness, etc.. I hold a degree in . Some of the notable projects I've worked on include: CISM (Certified Information Security Manager), AWS Certified Security – Specialty, MS-500: Microsoft 365 Security Administration, PGPCC – Post Graduate Program in Cybersecurity (Great Learning), CEH (Certified Ethical Hacker), etc.. I am based in Pune, India. I've successfully completed 7 projects while developing at Softaims.

My expertise lies in deeply understanding and optimizing solution performance. I have a proven ability to profile systems, analyze data access methods, and implement caching strategies that dramatically reduce latency and improve responsiveness under load. I turn slow systems into high-speed performers.

I focus on writing highly efficient, clean, and well-documented code that minimizes resource consumption without sacrificing functionality. This dedication to efficiency is how I contribute measurable value to Softaims' clients by reducing infrastructure costs and improving user satisfaction.

I approach every project with a critical eye for potential bottlenecks, proactively designing systems that are efficient from the ground up. I am committed to delivering software that sets the standard for speed and reliability.

Main technologies

  • Security, Compliance and Cybersecurity Platforms

    1 year

  • Information Security

    1 Year

  • Computing & Networking

    1 Year

  • Compliance

    1 Year

Additional skills

  • Information Security
  • Computing & Networking
  • Compliance
  • Cybersecurity Management
  • Information Security Awareness
  • Security Operation Center
  • Information Security Consultation
  • Security Analysis
  • Vulnerability Assessment
  • Cyber Threat Intelligence
  • Cybersecurity Monitoring

Direct hire

Potentially possible

Previous Company

Angel One

Ready to get matched with vetted developers fast?

Let's get started today!

Hire Remote Developer

Experience Highlights

CISM (Certified Information Security Manager)

• Information security governance and program management • Enterprise risk identification, analysis, and treatment • Security policy, standards, and control frameworks • Incident management governance

AWS Certified Security – Specialty

• Securing AWS environments using native security services • IAM design, least-privilege access, and role-based controls • Data protection using encryption, KMS, and secrets management • Logging, moni

MS-500: Microsoft 365 Security Administration

• Microsoft 365 security configuration and administration • Identity protection using Azure AD, Conditional Access, and MFA • Microsoft Defender for Office 365, Endpoint, and Identity • Information pr

PGPCC – Post Graduate Program in Cybersecurity (Great Learning)

• Practical understanding of enterprise cybersecurity domains • SOC operations, SIEM concepts, and alert triage fundamentals • Network, endpoint, and application security basics • Risk assessment, vul

CEH (Certified Ethical Hacker)

• Understanding attacker methodologies and kill chains • Identification of common vulnerabilities and misconfigurations • Web, network, system, and application attack vectors • Reconnaissance, exploit

Education

  • Symbiosis International University

    in Computer engineering

    2008-01-01-2011-01-01

Languages

  • English (Fluent)
  • Hindi (Native or Bilingual)