“Shortly after joining MIO, Sunit built the foundations of our first application security program. Everything from policy, procedures, severity guides, AST tooling and training were thoughtfully procured and implemented. A master at his tradecraft, Sunit comes highly recommended to build, lead and mature application security programs. ”
About
Application security professional with a experience in code reviews,security architecture…
Activity
-
Some key takeaways from my talk "Hitchhikers guide to secure AI Development" at AI Dev World 2025. Adding security by design/default in each phase…
Some key takeaways from my talk "Hitchhikers guide to secure AI Development" at AI Dev World 2025. Adding security by design/default in each phase…
Liked by Sunit Guldas
-
Excited to share that I've joined @Attentive as a Staff Application Security Engineer!
Excited to share that I've joined @Attentive as a Staff Application Security Engineer!
Liked by Sunit Guldas
-
I am ecstatic to share that I've been selected to join the 2025 SANS Security Awareness Summit Board!! Since moving into security in 2019, I've…
I am ecstatic to share that I've been selected to join the 2025 SANS Security Awareness Summit Board!! Since moving into security in 2019, I've…
Liked by Sunit Guldas
Experience
Education
Licenses & Certifications
Volunteer Experience
-
founder joint secretary
yuva jagruthi youth forum
- Present 12 years 10 months
Social Services
Courses
-
Advanced computer network security
-
-
Applied cryptography
-
-
Big data computing
-
-
Computer system security
-
-
Foundations of algorithms
-
-
Information assurance and security
-
-
Introduction to theoretical computer science
-
-
Principles of programming languages
-
-
Randomization and approximation algorithm
-
-
Software security
-
Projects
-
SDN-based Network IDPS and security analysis system in a Cloud
• Successfully deployed intrusion detection system which scans for vulnerabilities and generates an attack graph based on the severity.
• Applied deep packet inspection mechanism which makes the attack behavior more prominent and detectable.
• Improved the attack detection probability through programmable network approaches that improves the attack resilience of system by correlating attack behavior and employing effective countermeasures without interrupting existing services.
• Tools…• Successfully deployed intrusion detection system which scans for vulnerabilities and generates an attack graph based on the severity.
• Applied deep packet inspection mechanism which makes the attack behavior more prominent and detectable.
• Improved the attack detection probability through programmable network approaches that improves the attack resilience of system by correlating attack behavior and employing effective countermeasures without interrupting existing services.
• Tools used: KVM, OpenStack, Open vSwitch, POX, Python, Attack Graph Modeling-MulVal, SDN, Penetration Test Tool- (Nessus, Metasploit), Snort.Other creators -
Analyzing logs of tweets related to superbowl to analyze the level of support for team using hadoop
-
• Developed python code for map and reduce function to analyze tweet logs
• Generated a single file result to summarize the number of tweets in support of a team
• Tools used: python, hadoop, ‘R’ programming language.
-
Building a basic compiler to compile a language similar to C:
-
• Developed a lexical analyzer which tokenized the input.
• Developed a syntax analyzer which checked the syntax of the program and reported the errors.
• Developed a recursive decent parser which reported errors by line numbers.
• Developed a semantic analyzer incorporating it with the lexer and parser.
• Developed a final compiler which generates intermediate code that consists of machine language which could be further executed for results.
• Tools Used: C, C++, Eclipse…• Developed a lexical analyzer which tokenized the input.
• Developed a syntax analyzer which checked the syntax of the program and reported the errors.
• Developed a recursive decent parser which reported errors by line numbers.
• Developed a semantic analyzer incorporating it with the lexer and parser.
• Developed a final compiler which generates intermediate code that consists of machine language which could be further executed for results.
• Tools Used: C, C++, Eclipse IDE.
-
A Secure Banking System
-
• Developed a secure Java/J2EE web application based on spring MVC framework incorporating spring security framework and hibernate utilizing the backend MySQL workbench(RDBMS) database.
• Created modules that authorize stakeholders of a bank to create, delete, modify employees, customers and merchants and designed user interface utilizing HTML, CSS, JavaScript and Ajax.
• Implemented security features such as PKI for transaction authentication, self signed Certificate Authority for…• Developed a secure Java/J2EE web application based on spring MVC framework incorporating spring security framework and hibernate utilizing the backend MySQL workbench(RDBMS) database.
• Created modules that authorize stakeholders of a bank to create, delete, modify employees, customers and merchants and designed user interface utilizing HTML, CSS, JavaScript and Ajax.
• Implemented security features such as PKI for transaction authentication, self signed Certificate Authority for certificates management, OTP during transactions, input validations, SSL implementation, session management, hashing and salting of passwords and encrypting PII information.
• Conducted security testing using application security testing tools such as webscarab and burp suite.
• Tools used: Spring MVC, Hibernate, MySQL, HTML, CSS, JavaScript, AJAX.
Other creators -
Co-operative caching in Wireless P2P networks
-
• Developed an efficient algorithm for cooperative caching of data and to reduce overhead of copying data between user space and kernel space by implementing cooperative caching in wireless P2P network.
• Identified requirements, created technical specifications, coded user interface and performed unit and integration testing.
• Tools/Technologies: Netbeans, JAVA, JAVA Swings, MySQL
-
Seminar and Implementation of client-side Load balancer using cloud
-
• Designed a load balancer over the client side which would handle the web application traffic demand fluctuations by using a clouds on-demand, pay-per-use capability.
• Created technical specifications and user interface, performed unit and integration testing and presented a seminar.
• Tools/Technologies: Eclipse, HTML, JavaScript, MySQL, PHP
Languages
-
English
Full professional proficiency
-
Kannada
Native or bilingual proficiency
-
Hindi
Native or bilingual proficiency
-
telgu
Elementary proficiency
Recommendations received
2 people have recommended Sunit
Join now to viewMore activity by Sunit
-
Artificial Intelligence (AI) is everywhere, and lot of organizations are trying to make sense of security and compliance issues around it. AI…
Artificial Intelligence (AI) is everywhere, and lot of organizations are trying to make sense of security and compliance issues around it. AI…
Liked by Sunit Guldas
-
As Sharan Hegde blocked me, I can not ask him the clarifications any more. If there are any members of his club, can they clarify or get the…
As Sharan Hegde blocked me, I can not ask him the clarifications any more. If there are any members of his club, can they clarify or get the…
Liked by Sunit Guldas
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore More