Quantcast

Rest Api Web Applications Ai Ml Dl Devel...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title REST API, Web Applications, AI/ML/DL,Developer,Analyst
Target Location US-TN-Knoxville
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes
Click here or scroll down to respond to this candidate
Candidate's Name
US Status: Green Card HolderEmail: EMAIL AVAILABLE, EMAIL AVAILABLE Phone: PHONE NUMBER AVAILABLEI am an expert Security Engineer and Data analyst, having over 5 years of first-hand experience in Python, C and multiple years in JavaScript, HTML, PL/SQL in both the Industry and Academic environment. I am adept at con- ducting thorough vulnerability assessments, implementing robust security measures, and responding swiftly to security incidents. I have Strong knowledge of industry best practices, regulatory compliance, and emerging threats. I also design Data Modeling and Data Analysis using Machine Learning and Deep Learning techniques. I am Georgia Tech Graduate with specialization in Systems and Security; and highly motivated, innovative, results focused, enthusiastic about coding, debugging and learning new concepts. Key SkillsProgramming Languages: Python, C, JavaScript, Shell-script, HTML, PL/SQL Platform: Unix/Macintosh, Linux, WindowsIDE tools: Pycharm, Jupyter Notebook, WebStorm, Node.js, FireBase, Django Security tools: Snort (IDS/IPS/Firewall), Cuckoo (malware-analysis), Mininet, Wireshark, Nmap, BurpSuite Machine/Deep learning tools: Keras, Tensorflow, Scikit-learn, Panda, Networkx, Libsvm Data Analysis/visualization tools: Power-BI, Tableau, Pandas, Seaborn, Matplotlib, D3.js Network Model Protocol: DNS, SMTP, SNMP, TCP/IP, Routing Protocol (RIP,OSPF,BGP), HTTP/HTTPs Security Protocol: SPF, DKIM, DMARC, SOP, CORS, CSP, SSL/TLS Employment and ExperiencesDec 2021- MetLifePresent IT Risk, Security & Business Continuity Analyst - Application Security Efficiently mine, clean, manipulate very large volume of secure data using pandas Design reports and threats/malware/flaws analysis dashboard using Power-BI that visualize company performance. Also using DAX methodology in Power BI enable dynamic filtering of data models. Analyze data and extract useful statistics and insights using Machine learning and Deep learning tech- nique to drive meaningful improvements to risk mitigation, flaws analysis and customer experience. Assist in operational and security-related control and risk assessments to ensure compliance to regula- tory and statutory requirements, as well as industry specific guidelines Automate the extraction and storing in csv/exel format using APIs and Python Maintain detailed data dictionaries and documentation for all analysis process ad solutions. Develop operational reports and presentations using Excel and Power Point Sep 2021- Envisensai LLPNov 2022 Principle Developer Developed end-to-end automated data pre-processing and modeling pipeline using ML/DL algorithms Developed surrogate model and edge-computing enabled architecture of the ML/DL pipeline for local use Designed full-stack website using Node.js and Firebase. Also add REST-APIs for data handling and improve data functionality. Provided secured login, registration and account management for customer and developer using Google Cloud APIs Developed data-visualization platform using D3.js for end user. July 2021- University College LondonDec 2021 Machine Learning Engineer (visiting) Developed Deep Learning based Autoencoder workflow for biophysical and Computational pharmacol- ogy as required by the domain scientists Developed packages for pre- and post-processing codes for data curation, efficient data management, data handling and visualization Upgraded and optimized Deep Learning code-base to take advantage of state-of-the-art Python and CUDA libraries for efficient GPU uses Participated and helped analysing the data and created automated procedure for data plotting and interactive analysisJan 2017- University of Illinois at Chicago, Chicago, Illinois Dec 2018 Teaching/Research Assistant, Department of Computer Science Proctored exams, Graded assignments, Prepared materials/lecture for lab-demonstration, Holding office hour for doubt clearing and student assistance. Experimented on access control enforcement mechanisms like SOP, CORS, CSP on the web. Performed behavioral analysis of API calls those are responsible for Browser Finger-Printing. May 2018- Oak Ridge National Laboratory, Oak Ridge, Tennessee July 2018 ASTRO Intern, Computational Sciences and Engineering Division Build robust and scalable framework for unmixing of large set of hyper-spectral images using non-linear machine learning and deep learning techniques. Developed efficient, computationally cheap and faster methods for dimensionality reduction for large data-set using fewer parameters without loosing intrinsic characteristics. Compared among different Machine Learning and Deep Learning techniques to set-up benchmark results on GPU based machinesAug 2014- Indian Statistical Institute (Institute of National Importance), India Dec 2016 Project-linked-Person, Developer Developed tool for secure query processing for Semantic Web Application using Java and SPARQL Build a model for online social network based on trust value calculation Enhance the knowledge in graph analytics and graph theory Sep 2011- M/s INFOTECHJune 2012 Software Faculty Taught programming language like C & JavaEducation2020-2021 Master of Science (M.S.)Georgia Institute of TechnologyComputer Science, Remarks: GPA 3.80Courses: Applied Cryptography, Network Security, Information Security, Secure Computer Systems, Cyber Physical System Security, Computer Networks, Network Science, Adv Operating System, Grad Algorithms, HPC2012-2014 Master of Engineering (M.E.)Indian Institute of Engineering Science and Technology, IIEST (Institute of National Importance), India Information Technology & Engineering, Remarks: First Class (80.94%) 2007-2011 Bachelor of Technology (B. Tech)West Bengal University of Technology, WBUT, IndiaHeritage Institute of Technology, IndiaComputer Science & Engineering, Remarks: CGPA 8.44 Academic ExperienceStudy protocols for secure e-mail transferDescription: This project is all about the analysis of the security related e-mail protocols like SPF, DMARC, DKIM, STARTTLS, MTS-STS and measure the internet wide of its implementation. Technologies: Python, shell scriptImplementing Ethos operating system in Go language Description: This project is based on Ethos OS where I was implementing hierarchical object model for a document-type with some specific features for a web-API Technologies: Go languageM.E. thesisTitle: Fault-Tolerant Wireless Sensor NetworkDescription: Technological advancements in communications have led to the proliferation of Wireless Sensor Networks (WSNs) in a wide variety of application domains. One commonality across all WSN application domains is prolonged lifetime. Fault Tolerance in Wireless Sensor Networks can attain this requirement. For that, entire network is divided into clusters and one node is chosen as cluster head in each cluster. To increase the longevity of the cluster head, cluster heads responsibility is distributed among its neighbouring nodes. Another approach to elongate the network lifetime is choosing an efficient routing protocol. In routing the relay nodes are selected such a way, those are nearer to the cluster heads and belong to the minimal path coverage area between the source node and the destination node. So, it reduces the total transmission pathTechnologies: Matlab, programming in CB. Tech thesisTitle: Biometric Authentication Based on RetinaDescription: Retina recognition is a biometric technique that uses the unique patterns on a persons retina for person identification and the false acceptance ratio is low. In this project, a retinal-database is constructed collecting a hundred number of colourful retinal images. Then the features like the diameter of the optical disk, the curvature of retinal vein are extracted and stored them into a database. When a new image comes in, its features are extracted and compared with the stored database. If it matches up to a threshold, the new image is authenticatedTechnologies: Matlab, JavaB. Tech 3rd Year - Summer TrainingTitle: Online Art GalleryDescription: Design a website where users can upload or download images, make comments, can issue request to buy an image online specifying the image ID Technologies: ASP .Net in C#, Microsoft StudioB. Tech 2nd Year - Summer TrainingTitle: RDBMS (Relational Database Management System) Description: Basic programmingTechnologies: Sql, Pl/Sql, Oracle 9IPublication Candidate's Name , Pinakpani Pal and Abhik Mukherjee, Prevention of information leakage by modulating the trust uncertainty in Ego-Network, 9th International Conference Communication Systems and Networks (COMSNETS), 2017 pp377-378. Candidate's Name , Pinakpani Pal and Abhik Mukherjee, A Novel Scheme for Abatement of Pri- vacy Concern by Controlling the Reachability in Online Social Network, Soft Computing and Pattern Recognition (SoCPaR) 2016 International Conference, Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoC- PaR 2016) pp 686-697,Book series: Advances in Intelligent Systems and Computing Candidate's Name  and Indrajit Banerjee, Optimal Load Distribution of Cluster Head in Fault- Tolerant Wireless Sensor Network, Electrical, Electronics and Computer Science (SCEECS), 2014 IEEE Students Conference pp 1-7. The dynamics of Dengue Virus Methyltransferase subtypes: Same-same but different (In preparation). Structural dynamics of Urease accessory protein UreG Conformational flexibility of kRAS oncoprotein (In preparation).Scholarship/Grants 2012: Graduate Aptitude Test in Engineering (GATE), conducted nationally by the Indian Institute of Science (IISc) and Indian Institutes of Technology (IIT) on behalf of the Department of Higher Education USENIX Security 21 Diversity Grant GREPSEC V Workshop 2021 participantConference/Workshop Attended 11th International Conference on Information Systems Security, Dec 2015, Jadavpur University, Kolkata Tutorial on Information Systems Security, Dec 2015, Jadavpur University, Kolkata 4th International Conference on Emerging Application of Information Technology, Dec 2014, ISI, Kolkata Workshop on Data and Security, Sep 2014, ISI, Kolkata National Workshop on Networks and Distributed Algorithms, Mar 2014, ISI, Kolkata Research Promotion Workshop on Recent Trends in Computing, May 2013, IISET, Shibpur Research Promotion Workshop on Introduction to Graph and Geometric Algorithm, Mar 2013, IIEST, Shibpur

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise