Tejas Pagare
About Tejas Pagare
Tejas Pagare is a Vulnerability Researcher with experience in multiple cybersecurity roles, currently working at HackenProof and Bugcrowd. He holds a B.Tech in Cyber Security from Symbiosis Skills & Professional University and has earned several certifications from Zscaler.
Work at HackenProof
Tejas Pagare has been employed as a Vulnerability Researcher at HackenProof, a Web3 bug bounty platform, since 2023. In this role, he focuses on identifying and reporting security vulnerabilities within Web3 applications, contributing to the platform's mission of enhancing cybersecurity in decentralized environments.
Work at HackerOne
Tejas Pagare has served as a Vulnerability Researcher at HackerOne since 2021. His responsibilities include discovering vulnerabilities in various systems and applications, and he actively participates in the bug bounty programs offered by the platform. His work contributes to improving the overall security posture of organizations utilizing HackerOne's services.
Work at Bugcrowd
Since 2021, Tejas Pagare has been working as a Vulnerability Researcher at Bugcrowd. In this capacity, he engages in identifying security flaws in client applications and systems, providing valuable insights that help organizations mitigate risks and enhance their security frameworks.
Education and Expertise
Tejas Pagare is pursuing a Bachelor of Technology (B.Tech) in Cyber Security at Symbiosis Skills & Professional University, with an expected completion date in 2024. He has obtained several certifications from Zscaler, including ZTCA, ZIA, ZPA, and ZDX, which enhance his expertise in cybersecurity and cloud security solutions.
Background and Experience
Tejas Pagare has a diverse background in cybersecurity roles. He completed a brief tenure as a Security Engineer at The Magic Data in 2021 and worked as a TSCM Trainee at IndieBim Technology Solutions Private Limited in 2022. Additionally, he is currently interning at Tata Communications as a SOC Intern in Pune, Maharashtra, since 2023.