Contact Information

Whether you need a penetration test, a security assessment, or just want to discuss cybersecurity, I'd love to hear from you. Fill out the form or reach me through any of the channels below.

𝕏
Response time: Usually within 24 hours.
NDA: Available upon request before engagement.
Location: New Delhi, India (serving clients worldwide).

Frequently Asked Questions

What information do you need for a scoping call?

To prepare an accurate proposal, it helps to know: the type of application or system to be tested (web app, mobile app, network, API, cloud), the approximate number of targets or endpoints, any compliance requirements (PCI-DSS, SOC 2, ISO 27001), your preferred timeline, and whether you need a black-box, gray-box, or white-box assessment.

What is the typical timeline for a penetration test?

Timeline varies based on scope and complexity. A focused web application pentest typically takes 5-10 business days. Network assessments range from 3-7 days for external and 5-10 days for internal. Mobile app testing usually takes 5-7 days per platform. Complex engagements with multiple targets may take 2-4 weeks. A detailed timeline is provided in the proposal after scoping.

Do you offer retainer or ongoing services?

Yes, I offer retainer arrangements for organizations that need ongoing security support. This can include periodic penetration testing, continuous vulnerability monitoring, security architecture review, and on-call consulting for security incidents or questions. Retainer terms are customized based on your needs.

What regions do you serve?

I'm based in New Delhi, India, and serve clients worldwide. Most engagements are conducted remotely, though on-site assessments can be arranged for organizations in India and the broader Asia-Pacific region. I've worked with clients across North America, Europe, Asia, and the Middle East.

Can you sign an NDA before we discuss our security needs?

Absolutely. I understand the sensitive nature of security discussions and am happy to sign a mutual NDA before any detailed conversations about your infrastructure, applications, or security posture. Please mention this in your initial contact and I'll send over the agreement.

What does the final report look like?

The deliverable is a comprehensive PDF report that includes an executive summary for management, detailed technical findings with proof-of-concept evidence (screenshots, payloads, reproduction steps), risk ratings using CVSS scoring, and prioritized remediation recommendations. I also provide a follow-up retest to verify that fixes have been properly implemented.