Post Job Free

Resume

Sign in

Associate Software Engineer - Data Analyst

Location:
Sunnyvale, CA
Posted:
February 02, 2018

Contact this candidate

Resume:

Archana Hariharan www.linkedin.com/in/archanahariharan

**** *.********** *** *** 9, Sunnyvale, CA-94086 ac4big@r.postjobfree.com 1-352-***-****

EDUCATION M.S. in Electrical Engineering (Networking), San Jose State University GPA 3.575/4, May ‘16 Courses: Internetworking, Network Programming and Application, Broadband Communication Networks, Convergent Voice and Data Networks, Network Security, Wireless Networks.

B.E. in Electrical and Electronics Engineering, Meenakshi College of Engineering, Anna University, India. GPA 71/100, June 2011

PROGRAMMING Programming Skills: Python, JAVA, HTML, CSS.

SKILL Database: PostgreSQL, Impala, MySQL .

Operating systems: Windows, LINUX

Software Tools: JIRA,MS Excel,Splunk,Zeppelin,Ipython notebook

Networking protocols: TCP/IP, UDP, RIP, OSPF, HTTP, H.323, SIP,ARP, 802.11, DHCP, DNS, NAT, MPLS.

PROFESSIONAL FireEye.Inc EXPERIENCE Associate Software Developer (Data Analyst) (June 2016-September 2017) Tools: Postgresql, SQL, Impala

●Design, develop and document data queries (exposed using a generic API tool) on top of the data warehousing layer (Impala and Postgresql) that hosts email security and web security real time stats, so that our auto threat detection data is easily queryable and accessible for statistical analysis, reporting.

●Built data visualization charts using pivot table/splunk by analyzing the result set from the queries.

●Altered existing schema to accommodate new stats fields and also helped construct automatic data pruning and purging scripts to improve latency and performance of the database. This resulted in an immediate impact in our load handling capacity that helped us track 3X more detections from our security appliances.

●I also detected data anomalies that existed in our dataset and worked with the appliance teams and helped them fix it.

Real Time Stats parsing

Tools: Python, Postgresql

●Analyzed network setup, status and command usage statistics on Real Time Stats uploaded by FireEye appliances.

●Incorporated python's multiprocessing to parse data from approximately 13000 real time stats files simultaneously and loaded the data to the database (Postgresql).

●Performed analytics on the collected data and automated the process of sending out digest email on the metrics.

●Created graphical representation on the metrics collected using Ipython notebook for statistical analysis and reporting.

FireEye.Inc Counterintelligence Developer Intern (January 2016- June 2016)

Data Collection and Aggregation Application - Tools : Python, Postgresql

●Developed an application that uses twitter search API based for keywords (such as IP related violations relevant to counterintelligence) related and logged the results into a PostgresDB.

●Wrote a monitor script that supervises and monitors the app continuously and sends an email about the status of the application with relevant logs.

●Ranking and trend analysis of tweets are being constantly computed for active keywords. Also automated the process of sending out daily digest emails.

Domain Collector Application

●Developed an application that collects domain names from various sources (external, internal and zone files) and extract information like ip address and tld.

●Logged the results into a PostgresDB, so that analytics can be performed on data collected.

FireEye.Inc Technical Associate Intern (June 2015 -Dec 2015) Contact Center 2.0 CS_Voice Testing (Summer 2015):

●Drafted more than 300 test cases and tested them including functional testing and user acceptance testing for the new call routing flow that was implemented.

●Identified critical bugs and documented them in JIRA.

●Provided training to more than 50 engineers of different geo-locations on how to use Interactive Intelligence integrated within Salesforce.

●Generated statistical reports for the new implemented VOICE call flow to present it during intern presentation

●Measured bandwidth utility, QoS provisioning and performance for voice and video streaming using Appneta. Compared the results and presented the advantages for the new call flow in the intern presentation.

Infosys Technologies Pvt. Ltd. Test Engineer (Feb 2012- Aug 2013)

●Worked in coordination with development team to create and maintain manual verification tests for UI components of the application.

●Identified and documented system bugs on JIRA.

●Researched and documented details of errors in report-process immediately upon discovering problems.

Infosys Training Period Tools: Java, SQL, PL/SQL,CSS, HTML.

Designed a full-fledged student portal system with features like course search and enrollment. Used JPQL query to fetch and persist records and JSF to create web pages. Got a CGPA of 4.32/5 during the training program.

ACADEMIC Multitenancy in virtual tenant networks in DCN using SDN with QoS Enhancement

PROJECTS Tools: Python, Mininet, POX, VMware ESXI, sFlow-RT

Created a fat-tree topology based Data Center Network in SDN using Mininet and POX SDN controller. Achieved multi-tenancy by creating three tenants using VLANs and PVST. Improved Quality of Service to tenants by dynamically reallocating bandwidth based on number of hosts in each tenant

Multiprotocol Label Switching (MPLS) Network Implementation using NS3

Tools : NS3

Designed a label switched network using NS-3 tools for the simulation of label switching. Installed python and mercurial on the Ubuntu Linux distribution for the simulation of our project. Studied and analyzed the packet labelling along with push, pop and swap operations in label switching.

Team File Sharing Tools : Java to implement socket programming, HTML, CSS for web page, cURL for inter-domain communication and PHP for web server backend.

Designed a client-server architecture. Developed a client interface to upload an image file to the server, share this file with other team members and display/download the files on the server.

Simulation of BGP PREFIX Hijacking and SUB-PREFIX Hijacking Attacks

Simulated the BGP Prefix and Sub-Prefix Hijacking attack in Deter lab. The victim was forced to take a manipulated path to download a bogus file using FTP.



Contact this candidate