profile-pic

Abisheik Magesh

Dynamic cybersecurity professional with Bachelor's degree in Computer Science engineering and proven track record spanning years of safeguarding digital environments. Adept in automation via coding/scripting, advanced SIEM analysis capabilities, anomaly detection, incident response, and deep understanding of attacker tactics/tools. Exceptional communicator, prioritizing tasks, and fostering collaborative teamwork. Proactive threat hunter, incident escalation, and response initiatives spearhead. Passionate about user safety, promoting integrity, and exceptional problem-solving in high-pressure settings. Committed to ongoing development in cybersecurity.
  • Role

    Intermediate Vulnerability Research Engineer | Application Security Engineer

  • Years of Experience

    3.11 years

Skillsets

  • LangGraph
  • Vulnerability management
  • threat modeling
  • supply chain security
  • Semgrep
  • Security Automation
  • secure code review
  • SCA
  • SAST
  • red teaming
  • Qualys
  • Promptengineering
  • product security
  • Penetration Testing
  • Nuclei
  • Nexus IQ
  • Python
  • LangChain
  • Fortify
  • Exploit Analysis
  • Dependabot
  • DAST
  • Cve research
  • CI/CD
  • Burp Suite
  • Bash
  • Application Security
  • AI security
  • Agentic AI
  • Agentic AI
  • Api Security
  • Cloud Security

Professional Summary

3.11Years
  • Apr, 2025 - Present1 yr 1 month

    Intermediate Vulnerability Research Engineer

    GitLab
  • Nov, 2024 - Apr, 2025 5 months

    Application Security Engineer

    New Relic
  • Apr, 2023 - Nov, 20241 yr 7 months

    Senior Application Security Engineer

    Synchrony
  • Feb, 2022 - Apr, 20231 yr 2 months

    Application Security Intern

    Synchrony

Applications & Tools Known

  • icon-tool

    Python

  • icon-tool

    Postman

  • icon-tool

    SOAR

  • icon-tool

    Splunk

Work History

3.11Years

Intermediate Vulnerability Research Engineer

GitLab
Apr, 2025 - Present1 yr 1 month
    Conducted SAST and secure code reviews across GitLab and open-source libraries, uncovering logic flaws, injection, and access control issues. Expanded GitLabs SAST engine by adding custom detection patterns for modern frameworks (JavaScript, TypeScript, Python). Researched supply chain risks including dependency confusion, malicious NPM packages, and open source exposures. Partnered with development teams to provide remediation guidance and training for security champions. Worked on an AI-driven research Initiative Focused on Secure code. Engineered AI agents to automate workflows in the team.

Application Security Engineer

New Relic
Nov, 2024 - Apr, 2025 5 months
    Managed Bug Bounty Program (Bugcrowd), validating 150+ reports and reducing SLA by 25%. Deployed SAST (Semgrep) and SCA (Nexus IQ) across SDLC pipelines, increasing adoption by 40%. Conducted attack modeling and API penetration tests, preventing authentication bypass and IDOR vulnerabilities. Automated security regression testing for critical APIs using CI/CD integration.

Senior Application Security Engineer

Synchrony
Apr, 2023 - Nov, 20241 yr 7 months
    Promoted to Senior Engineer for leadership in secure SDLC, threat modeling, and API security. Lead Dynamic Application Security Testing (DAST) scans and comprehensive web application security assessments for a variety of applications, encompassing customer-coded, internal, and external-facing systems. The DAST tools used by the enterprise to perform thorough evaluations and identify vulnerabilities significantly improved the overall security posture of the application. Automated vulnerability triage and exploit validation (Python/Bash), cutting false positives by 30%. Conducted SAST and SCA, ensuring secure usage of third-party components. Delivered developer security training for 500+ engineers, reducing recurring flaws by 35%. Performed threat modeling workshops with architects to identify high-risk attack surfaces early. Drove AppSec metrics and reporting for executive leadership using dashboards and KPIs.

Application Security Intern

Synchrony
Feb, 2022 - Apr, 20231 yr 2 months
    Assisted in SAST/DAST scanning and triaging results, providing remediation support to developers. Performed secure code reviews on Java and JavaScript microservices. Conducted OWASP Top 10 testing for internal APIs and web applications. Created security playbooks and documentation for repeatable vulnerability assessments.

Achievements

  • Part of Airtel Live hacking 2022, 2023
  • Part of Facebook Invite only Conference and live hacking event 2021
  • Published Exploit on Exploit DB #50925
  • Published Research paper on Web Application Security Testing Framework on IEEE 2023
  • CVE-2021-24434, WPScan - WordPress Security
  • CVE-2021-24481, WPScan - WordPress Security
  • CVE-2021-24480, WPScan - WordPress Security
  • CVE-2021-24479, WPScan - WordPress Security
  • CVE-2021-24478, WPScan - WordPress Security
  • CVE-2021-24477, WPScan - WordPress Security
  • CVE-2021-24534, WPScan - WordPress Security
  • CVE-2021-24581, WPScan - WordPress Security
  • 2nd place in INCTF national level
  • 3rd place in Appsec hackathon - synchrony ctf
  • Top 5 in Cyberchaze by Schneider Electric
  • Bug bounty Rewards from top tech companies including Tesla Motors, Google, Apple

Major Projects

1Projects

Published Research paper on

Education

  • B.E. Computer Science

    Sathyabama Institute of Science & Technology (2023)