Post Job Free
Sign in

System Administrator Network Engineer

Location:
San Jose, CA
Posted:
July 17, 2018

Contact this candidate

Resume:

FAGUN TRIPATHI

San Jose, CA, ***** *****.********@*****.*** linkedin.com/in/fagun-tripathi +1-669-***-**** EDUCATION

San Jose State University May 2018

Master of Science in Electrical Engineering with specialization in Networking Gujarat Technological University June 2016

Bachelor of Engineering in Electronics and Communications Engineering (ECE) TECHNICAL SKILLS

HANDS ON EXPERIENCE

L2-L7 Protocols : DNS, DHCP, ICMP, OSPF, NAT, STP, VLAN, OpenFlow Software Tools : GNS3, Wireshark, Cisco Packet Tracer, Putty, Google WebRTC, Mininet, Floodlight Controller, Open Network Operating System

(ONOS), NS3, Jupyter Notebook, Spyder

Virtualization Softwares : VMware, Oracle Virtual Box, Xen Hypervisor, ClickOS Network Security Tools : Nessus, Snort, Nmap, Netcat, WinSCP, DVWA, DeterLab, OpenSSL, traceroute, Metasploitable Framework, Burp Suite Security Concepts : Intrusion Detection Systems (IDS), ARP Spoofing, DNS Spoofing, Penetration Testing, Vulnerability Scanning, Flooding Attacks, DoS, DDoS, Access Control Lists (ACL)

Programming Languages : C (basics), C++ (basics), Python, BASH Operating Systems : Windows, Unix, Ubuntu, Red Hat Enterprise Linux (RHEL), Kali Linux, Cisco IOS, CentOS KNOWLEDGE BASIS

Wireless Technologies : LTE Network, Bluetooth, WLAN, Wireless Ad-Hoc Networks (WANET), Mobile Ad-Hoc Networks (MANET), IEEE 802.11 Technologies, UMTS, RFID, Ad-hoc Routing Protocols Security Concepts : HTTPS, SSH, VPN (basics), IPSec, CIA Triad, Encryption Techniques and Standards, Key Management, Public Key Certificates, SSL/TLS, WEP, RADIUS, TACACS+, Brute Forcing

Protocols : TCP/IP, IPv4, IPv6, HTTP, Telnet, FTP, ARP, TFTP, HSRP, QoS, RSVP, MPLS, RIP, EIGRP, SIP, BGP CERTIFICATIONS CCNA- Cisco Certified Network Associate v3.0 (Routing & Switching) Cisco ID: CSCO13268689 RHCSA- Red Hat Certified System Administrator (v7.0) License ID: 160-098-356 IPv6 Forum Certified Network Engineer (Silver) License CNES-100*****-** CCNA Global Cybersecurity (Cyber-Ops) Scholarship Holder ACADEMIC PROJECTS

• Intrusion Detection Using Machine Learning Algorithms (Python, NumPy, pandas, scikit-learn, matplotlib)

Performed pre-processing for transformation of raw data and tested different supervised Machine Learning algorithms like k-Nearest Neighbors (k-NN), Random Forests, Decision Trees and Support Vector Machines (SVM) on the benchmark NSL-KDD Intrusion Detection Dataset

Concluded Random Forests methodology for providing the best prediction results at 96.81%

Successfully predicted different attack labels in the data and generated respective prediction graphs as well as classification reports for the same

• Signature Based Network Intrusion Detection System (Kali Linux, Ubuntu, Snort, VMware Workstation, IDS)

Created a sandbox environment for simulating different attacks against a Linux VM with Snort running in the background

Modified the running configuration of Snort with packet filtering rules against different attack vectors

Tested and successfully detected different attacks such as HTTP Flood, UDP Flood, SYN Flood, ICMP Flood, Source Quenching Attack, ICMP Redirect Attack, TCP Reset Attack, Smurf Attack, SYN FIN Scan, Ping of Death, Traceroute and Superscan Echo

• Fault Tolerant Master-Slave Architecture for Software Defined Networking (SDN, ONOS, Floodlight, Mininet, Docker, Virtual Box, Linux)

Modeled a network topology of multiple controllers with a master-slave redundancy-based control plane architecture

Exploited the clustering features of ONOS architecture and instantiated parallel controller instances running from Docker containers

Deployed the similar architecture in the Floodlight controller environment

Achieved zero downtime issues while simulating scenarios of master controller failure in both the environments ensuring reliability

• Voice over IP in a Wireless Ad-Hoc Network (WANET) (Asterisk, X-Lite, Python, SIP, WLAN, Ubuntu, Virtual Machines)

Set up a wireless ad-hoc network consisting of client-server end systems for initiating different call scenarios between the clients

Configured a proxy Server in Ubuntu for administering different SIP based calling functionalities

Modified the SIP running configuration in the server machine for establishment of connections between the clients and performed different scenarios

Facilitated the client end by executing a Python script that could perform call handling tasks on behalf of a client

• Dynamic Firewall Provisioning using Virtualization Platform ClickOS (Ubuntu, Xen, MiniOS, Network Function Virtualization)

Instantiated ClickOS on the top of the hypervisor platform Xen

Open vSwitch was used to set up virtual interfaces

Programmed an application using Click virtual elements to perform packet filtering functions on the network interface

• Stateless Dynamic Firewall Application using Python (Scapy, Nfqueue, Python, Ubuntu, Virtual Box)

Orchestrated a Python script to perform analysis and filtering of data packets

Scapy was used for decoding the headers of packets received by the system

Using Nfqueue, a queue was created for passing the packet headers for firewalling

The firewall parameters were user-defined such that the packets could be blocked or accepted based on an IP Address, Protocol or Port Number



Contact this candidate