SCENE // CYBER // TAKE 04
PRODUCTION
Security Briefing
DIRECTOR
M. S. KADAM
CAMERA
A · LENS 35mm
DATE
2026.05.20
ROLL CAMERA ACTION
HOME / CYBER

Defend.
Detect.
Respond.

Master Certification in Cybersecurity from Guvi (IIT Madras) and CEH from EC-Council. Penetration testing, IAM, PAM, CyberArk, Dark Web Analysis and security awareness training for studios and SMEs.

ETHICAL HACKING PENETRATION TESTING IAM · PAM CYBERARK DARK WEB ANALYSIS OWASP INCIDENT RESPONSE COMPLIANCE
CYBER / 01
Overview

Security with enterprise depth.

Backed by EC-Council Certified Ethical Hacker (CEH) and Master Certification in Cybersecurity from Guvi (IIT Madras). Specialising in identity, privileged access, and dark web intelligence for production houses and SMEs.

GUVI · IIT MADRAS
Master Certification in Cybersecurity
Comprehensive program · IIT-incubated
EC-COUNCIL
Certified Ethical Hacker (CEH)
Industry-recognised offensive security
HCL GUVI · 2022
Ethical Hacking · Dark Web Analysis
Three credentials including Python
CYBER / 02
Service Areas

What I do, in security.

[ 01 ]

Penetration Testing

Web, network and application pentests. Burp Suite, Metasploit, Nmap, OWASP ZAP. Reports with severity-rated findings and remediation playbooks.

[ 02 ]

IAM & PAM

Identity and Privileged Access Management. CyberArk implementation, role-based access, MFA enforcement, session monitoring.

[ 03 ]

Dark Web Analysis

Threat intelligence: monitor leaks, compromised credentials, brand mentions on dark web marketplaces. Proactive defence over reactive.

[ 04 ]

Security Audits

End-to-end audits of infrastructure, applications and policies. Compliance gap analysis. Remediation roadmaps with priority tiers.

[ 05 ]

Awareness Training

Phishing simulations, social engineering workshops, secure-by-default development practices. Built for studios protecting unreleased IP.

[ 06 ]

Incident Response

Forensic investigation, containment, recovery. Chain-of-custody documentation. Post-incident hardening recommendations.

CYBER / 03
Toolstack

The defender's arsenal.

Burp Suite Metasploit Wireshark Kali / Nmap OWASP ZAP CyberArk Python (Offensive) EC-Council CEH