| 20,000+ Fresh Resumes Monthly | |
|
|
| | Click here or scroll down to respond to this candidateCandidate's Name
New York, USA PHONE NUMBER AVAILABLE EMAIL AVAILABLE LinkedInEDUCATIONSyracuse University - College of Engineering & Computer Science, Syracuse, NY May Street Address Master of Science: Cybersecurity Relevant Course Work: Computer Security, Internet Security, IOT security, Machine Learning for Security. Dr. D Y Patil University - Ramrao Adik Institute of Technology, Navi Mumbai, India July Street Address Bachelor of Engineering: Information Technology. Relevant Course work: Data Structures, Computer Network, System Security. Published a technical paper titled SMART MIRROR 2.0 during the 6th International, Equinox 2021. TECHNICAL SKILLS Programming Languages: Python, Bash/Shell. Skills: Security Operations, Network Monitoring, Log Analysis, Vulnerability Management, Incident response, Network Pen-Testing, Network Security, threat intelligence, SIEM, Web-App Pen-Testing. Tools: Nessus, Burpsuite, Wireshark, Metasploit Framework, AlienVault OSSIM, Fortinet Fortigate, Zscaler, Smokescreen, Qualys, Splunk, Hydra, Dirb, OWASP Zap, Maltego, Nikto, BeEF, SISA MDR, MITRE ATT&CK. Networking Protocols: TCP/UDP, IP, ICMP, BGP, SMTP, DNS, DHCP, HTTP/HTTPS. Certifications: CEH, Certified Cybersecurity Analyst, Kali Linux tutorial, eJPT. EXPERIENCETeaching Assistant, Syracuse University Syracuse, NY July 2023 - August 2023 Led and facilitated a "Hackathon Experience" workshop with Prof. Bahram A Attaie, providing hands-on training to 50+ students in Ethical Hacking and SOC practices. Empowered students with advanced skills in vulnerability assessment and penetration testing, driving a 30% average improvement in security proficiency through rigorous instruction on system weakness identification and mitigation. Security Operation Centre Engineer (Full Time), Hitachi Payment Services Private Limited Mumbai, India October 2021 - June 2022 Configured and optimized deception-based threat defense platform to detect and thwart lateral movements, man-in- the-middle attacks and ransomware, resulting in a 60% decrease in successful intrusions. Monitored SIEM alerts and analyzed application performance to identify irregular activities with 95% accuracy, reducing the average response time by 50%. Analyzed complex security events, logs, and network traffic to uncover indicators of compromise (IOCs) and potential threats, utilizing advanced techniques to assess over 1000 patterns monthly. Collaborated with Information Security team to launch a detailed investigation on Log4Shell vulnerability, leading to the identification of over 300 compromised systems and mitigating risk exposure by 75%. Vulnerability Assessment and Penetration Testing Intern, Wattlecorp Cybersecurity Labs LLP India May 2021 - June 2021 Performed extensive vulnerability assessments on virtual machines using fingerprinting, nmap scanning, and network protocol analysis (TLS, ARP, SSH), identifying 98% of open ports and services. Leveraged hands-on experience of tools such as Burpsuite, Hydra and Nessus to design customized penetration testing scenarios for simulated machines, resulting in determining critical vulnerabilities with a severity of 9/10. Collaborated with senior team members to develop automated vulnerability assessment scripts using Python increased efficiency by 40%, reduced assessment time.Software Developer Summer Intern, Ramrao Adik Institute of Technology India June 2020 - August 2020 Developed an innovative extractive summarization model deploying Python and Natural Language Processing techniques, yielding a 35% improvement in information retrieval. Led a team of 10 project interns, overseeing the development of extractive summarization techniques resulting in structured and easily accessible information.PROJECTImplementing CSRF Token Patterns to Secure Internet of Thing Fall 2023 Evaluating CSRF token implementation to prevent Cross-Site Request Forgery attacks on IoT devices, targeting a 75% reduction in cyberattacks to bolster IoT security. Image and audio steganography Fall 2022 Implemented steganography leveraging traditional encryption/decryption techniques alongside the innovative "Left Bit- Shift in Random Cycle Order" algorithm, resulting in a 40% improvement in data concealment capabilities. |