Rochak Agarwal
About Rochak Agarwal
Rochak Agarwal is a Security Researcher based in Jalandhar, Punjab, India, with expertise in Java, Python, and SQL. He has developed backend services using the SpringBoot framework and has worked at HackerOne, Intigriti, and Bugcrowd since 2020.
Work at HackerOne
Rochak Agarwal has been employed at HackerOne since 2020, serving as a Security Researcher. In this role, he focuses on identifying and mitigating security vulnerabilities, contributing to the platform's mission of improving cybersecurity through responsible disclosure. His work involves collaborating with various teams to enhance the security posture of client applications.
Work at Intigriti
Since 2020, Rochak Agarwal has also held the position of Security Researcher at Intigriti. His responsibilities include conducting security assessments and participating in bug bounty programs. His expertise aids organizations in identifying potential security flaws and improving their overall security strategies.
Work at Bugcrowd
Rochak Agarwal has been a Security Researcher at Bugcrowd since 2020. His role involves engaging with clients to uncover vulnerabilities in their systems. He utilizes his technical skills to provide actionable insights that help enhance the security of various applications.
Education and Expertise
Rochak Agarwal studied at Lovely Professional University, where he earned a Bachelor of Technology in Computer Science from 2018 to 2022. His academic background provides a solid foundation in software development and security principles. He is proficient in programming languages such as Java, Python, and SQL, which are essential for his work in security research.
Background
Rochak Agarwal is based in Jalandhar, Punjab, India. His career in security research began in 2020, and he has since gained experience across multiple platforms, including HackerOne, Intigriti, and Bugcrowd. His focus on backend development and security assessments has established him as a knowledgeable professional in the cybersecurity field.