Mail: email@example.com Major: Cyber Security Minor: Project Management Mobile: +1-346-***-**** A seasoned, energetic, self-motivated, technical-minded professional with 4 years of experience in IT sector and 2 years in IT security seeking a position in a professional environment that utilizes my Secure computing skills with a creative and technology driven environment that encourages recognition and career development. Security Tools Metaspoilt, Burpsuite, Nessus, Nexpose, Mcafee E-policy Orchestrator, Wireshark, Snort, TCPdump, Tidy AD, RSAT, Spirion, NSlookup, Nmap, Dmitry, Xprobe2, Netdsicover, OpenVas Languages COBOL, JCL, Rexx, JAVA, JAVA Script, HTML, XML, CSS, VB, C, C++ Application Software MS Excel (Macros), MS PowerPoint, MS Word, Outlook, MS Project, VMware Design Software Adobe After Effects, Power Director, Adobe Illustrator, Microsoft Visual Studio, Photoshop Database / File system DB2, My SQL, IMS, MS Access Tools Logix Pro, FILE-AID, SPUFI, QC, Endeavor, Xpediter, CA7 Operating system Linux(Kali, Ubuntu, RedHat),Unix,IBM z/OS(Mainframe),Windows 10,8,7, MS server 2008 EDUCATION & TRAINING
Master of Science in Information Systems Security UNIVERSITY OF HOUSTON Houston,TX 2018 CGPA:3.93/4 Bachelor of Science in Information Technology ANNA UNIVERSITY Chennai, India 2012 CGPA: 8.4/10 EXPERIENCE & NOTABLE CONTRIBUTIONS
Certifications & Achievements
CEH v9 Certified (Certified Ethical Hacker)
Lean six Sigma – Green belt Certified.
EC-Council - Pen Tester (CAST 611)
RHCE Certified. (Red Hat Certified Engineer)
Best Employee - Insta award at Infosys Limited for developing tools for automation with Bank of America. Pen Testing & Control Systems
Ec-Council Certified Pen tester, have extensively worked on Pen Testing, owning root and system access by finding exploits and vulnerabilities. Active participation in BLUE team activities. Along with Experience in SCADA control systems Security. University of Houston – Facilities Services – IT Security Engineer & Intern
Help making audit of computers, Update Security policies, Check compliance for privacy, Security updates, apply hotfixes, patch management, Incident Response, Risk assessment and manage computers across Facilities.
Worked on Incident Response of malware in the environment, helped documenting and explain criticality to employees.
Build security implementations using best practices, standards, & commercial technologies to address security challenges.
Monitor and manage compliance of enterprise information systems.
Support and facilitate audits of enterprise information systems.
Support vulnerability remediation tasks that focus on risk reduction.
Assist in the development and deployment of security awareness training on anti-phishing and social engineering exercises. Infosys Limited
Senior Systems Engineer, Client: Royal Bank of Scotland Mar 2015 to July 2016
Developed working modules for Bank Advices & Archives.
Dealt migration of data bases & working modules to a new environment by Cloning process in Etl & non Etl phases. Systems Engineer, Client: Bank of America Dec 2013 to Feb 2015
Provided online systems to facilitate international trade financing through Letter of credits and its variants, Documentary collections, Bankers’ acceptance & Open accounts.
Managed trade finance applications to interact with downstream applications & warehouses for data input & output. Bee Hive Tech July 2012 to Jun 2013
Worked on E-Publications and IT services which include software solution, Automation Projects, web solutions.
Developed Products that include SMS automation, Bio-metric authentication and webhosting. Intern at SSL Computers
Worked on technical IT services, supported Customers in accordance with company policies and procedures.
Resolved critical support requests related to the company’s end to end operation. Academic Projects (IT Security)
Incident Response – Ransomware Aug 2017 to Mar 2018
Designed an Incident Response playbook for the University of Houston Facilities IT Security Department. Nymble : Blocking Misbehaving users in Anonymizing Networks Aug 2011 to May 2012
Built a comprehensive credential system to add a layer of accountability to any publicly known anonymizing network.
Performed various tasks like blocking anonymous authentication, subjective blacklisting, authentication speeds.