Quantcast

Information Technology Intern Resume Ind...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Information Technology Intern
Target Location US-IN-Indianapolis
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Information Technology Devops Engineer Carmel, IN

Information Technology Front Desk Indianapolis, IN

Project Management Information Technology Lafayette, IN

Power Bi Information Technology Noblesville, IN

Security Guard Information Technology Indianapolis, IN

Information Technology Quality Control Frankton, IN

Information Technology It Support Indianapolis, IN

Click here or scroll down to respond to this candidate
                                                                                        Indianapolis, Indiana 26202, USA
          Candidate's Name                                                     EMAIL AVAILABLE | (PHONE NUMBER AVAILABLE
                                                                              Digital Portfolio| Google Scholar | LinkedIn


PROFESSIONAL EXPERIENNCE

       Gurugram Police Cyber Security Summer Internship (View in Detail: Digital Portfolio)           Jun  Street Address    July  24
       Indian Police Cyber Crime - Gurugram, India
           o During the GPCSS12024 internship, I gained practical cybersecurity experience, highlighted by participating
               in the Zupee Capture The Flag (zCTF) challenge.
           o Competing with 256 participants, we tackled 17 complex cybersecurity tasks in a 4-hour session, that focused
               on threat detection, incident response, and ethical hacking.


       JP Morgan & Chase Co. Cybersecurity Virtual Experience Program (View in Detail: Digital Portfolio) Aug  23
       Virtual Program
           o The Virtual Experience Program offered practical experience in threat identification, secure code review, risk
               assessment, and incident management.
           o Utilized technologies such as Splunk for Security Information and Event Management (SIEM) for network
               monitoring systems, and secure coding practices to address security challenges.

       Cyber Security Analyst (View in Detail: Digital Portfolio)                                       Oct  22   Nov  22
       Intrainz - Noida, India
           o My role at Intrainz focused on identifying vulnerabilities through vulnerability assessment, and using SIEM
               tools to identify and tackle security incidents.
           o Furthermore, enhanced the network security through tasks such as port filtering, and setting up firewall rules
               on the cloud.
           o Also gained an understanding of NIST Cybersecurity Framework (NIST CSF) and OWASP Top 10 Principles
               that establish several robust security protocols in a company.


       Google Cloud Ready Skills Boost Program (View in Detail: Digital Portfolio)                       Apr  22   Jun  22
       Google Cloud Community India
          o Throughout this three-month program, I gained hands-on expertise with a variety of Google Cloud Platform
              tools including Firewall Security, Kubernetes Engine, Docker, Firestore, Compute Engine, BigQuery, etc. I
              worked on configuring these technologies to ensure data protection and operational resilience in the cloud .

KEY PROJECTS (Screenshots and working of Projects on: Digital Portfolio)

       CryptStego   Web Application offering Information Security using Cryptography and Steganography for encryption
       and decryption (Link to repository on GitHub)
       Utilized TCP Dump to capture packets and then use Wireshark to analyze HTTP/S and RDP traffic
       Vulnerability Assessment through Quantitative Analysis (OSINT Framework)
       Enabling and Configuring Microsoft Firewall Rules
       Access Control and Management of text files using Linux commands
       Evaluation of Various Lightweight Cryptographic (LWC) Ciphers for Smart Cities (Link to repository on GitHub)
       Resolve Ransomware Attack on a Linux Virtual Machine through decryption techniques of a of
       Used Event Tracing for Windows (ETW) to identify unusual parent-child relationships and malicious. NET assembly
       loading
       Utilized Get-WinEvent cmdlet to analyze Windows Event Logs
SKILLS

        Splunk SIEM Dashboard                                             Linux System Administration and Commands
        Network traffic analysis using TCPDump and Wireshark              NIST CSF and OWASP Principles
        Microsoft Windows Defender and Windows Firewall                   Windows Event log analysis using Sysmon and
        Vulnerability Management and Threat Analysis                      Tracing for Windows (ETW)
        Windows Active Directory                                          Penetration Testing on Kali Linux


EDUCATION

    -       Master of Science   Cybersecurity and Trusted Systems,                                          Aug  24   Jun  26
            Purdue University, Indiana, USA
                   Cumulative GPA: N/A (First Semester)

    -       Bachelor of Technology   Computer Science and Engineering                                       Sept  20   Jun  24
            Sharda University, Noida, India
                   Cumulative GPA: 9.0 (10.0 point-scale)
                   Activities: Head Coordinator of Cyber Pirates Club

MAJOR PUBLICATIONS (View in Detail: Google Scholar)

                                             All in the field of Cybersecurity
             Candidate's Name , Bharat Bhushan,  Recent Lightweight Cryptography (LWC) based Security Advances for
             Resource-Constrained IoT Networks  (Published in Q2 Journal of Wireless Network, Springer, Link to the
             paper)

             Candidate's Name , Bharat Bhushan,  Exploring The Viability And Effectiveness of Lightweight Cryptographic
             Techniques in Enhancing The IoT Data Security of Smart Cities , 2nd International Conference on Computational
             Intelligence and Sustainable Engineering Solutions (CISES 2023), Greater Noida, India, April 2023 (Proceedings
             published by IEEE, Link to the paper)

             Candidate's Name , Bharat Bhushan, Alaa Ali Hameed, Akhtar Jamil, Aayush Juyal,  Implementation of
             Homomorphic Encryption Schemes in Fog Computing , The 2nd International Conference on Computing, IoT and
             Data Analytics (ICCIDA 2023), La Mancha, Spain, July 2023 (Proceedings published by Springer, Link to the
             paper)

             Candidate's Name , Pashupati Baniya, Parma Nand, Alaa Ali Hameed, Bharat Bhushan, and Akhtar Jamil,
              CryptStego: A Powerful Blend of Cryptography and Steganography for Securing Communications , International
             Conference on Emerging Trends and Applications in Artificial Intelligence , IoT and Data Analytics (ICETAI 2023),
             Istanbul, Turkey, September 2023 (Proceedings published by Springer, Link to the paper)

             Candidate's Name , Abhik K. De, S. Choudhary, B. Bhushan, S. Bhatia,  Leveraging Blockchain Technology in
             Industry 4.0 and Industrial Internet of Things (IIoT) Scenarios , Chapter 12 under Book of Low Power Architectures
             for IoT Applications (Chapter published by Springer, Link to the chapter)

             Candidate's Name , Abhik K. De, S. Choudhary, M. Asim, "A Decentralized Blockchain-Based Architecture for
             Healthcare Industry", International Conference on Artificial Intelligence for Innovations in Healthcare Industries
             (ICAIIHI-2023), Chhattisgarh, India, December 2023 (Proceedings published by IEEE, Link to the paper)

Respond to this candidate
Your Email «
Your Message
Please type the code shown in the image:
Register for Free on Jobvertise