Bhagwat Jadhav
About Bhagwat Jadhav
Bhagwat Jadhav is a Security Researcher based in Pune, Maharashtra, India, currently working as a SOC Analyst at Brose India Automotive Systems Pvt. Ltd. since 2022, and actively participating in cybersecurity platforms like TryHackMe and Bugcrowd.
Work at Bugcrowd
Bhagwat Jadhav has been employed as a Security Researcher at Bugcrowd since 2022. In this role, he engages in identifying and reporting security vulnerabilities, contributing to the overall security posture of various organizations. His responsibilities include participating in bug bounty programs and collaborating with other security professionals to enhance cybersecurity measures.
Current Role at Brose India Automotive Systems
Since 2022, Bhagwat Jadhav has served as a SOC Analyst at Brose India Automotive Systems Pvt. Ltd. in Pune, Maharashtra. His role involves monitoring security incidents, analyzing threats, and implementing security protocols to protect the organization's information systems. This position allows him to apply his cybersecurity skills in a corporate environment.
Education and Expertise
Bhagwat Jadhav studied Mechanical Engineering and earned a Bachelor of Engineering (BE) degree from both SINHGAD INSTITUTE OF TECHNOLOGY, LONAVLA and Savitribai Phule Pune University between 2015 and 2020. His educational background provides a strong foundation for his current work in cybersecurity, where he applies technical knowledge and analytical skills.
Capture The Flag Participation
Bhagwat Jadhav actively participates in Capture The Flag (CTF) events to enhance his cybersecurity skills. He has been involved with TryHackMe as a CTF Player since 2021 and previously worked with Hack The Box for five months in 2022. His participation in these events reflects his commitment to continuous learning and skill development in the cybersecurity field.
Technical Skills and Tools
Bhagwat Jadhav possesses a strong understanding of operating systems, particularly Linux (Kali) and Windows, which supports his cybersecurity tasks. He has hands-on experience with various penetration testing tools, including Metasploit, BurpSuite, Nmap, Nessus, Wireshark, and SQLMap. His proficiency with these tools enhances his capabilities as a security researcher.