Resume

Sign in

Security Information

Location:
Harrison, New Jersey, United States
Salary:
65000
Posted:
August 14, 2018

Contact this candidate

Resume:

VISHVAS TAAK

w ww.vishvastaak.com +1-973-***-**** v ac6n8i@r.postjobfree.com l inkedin.com/in/vishvas-taak EDUCATION:

New Jersey Institute of Technology (NJIT), Newark, NJ May 2018 Master of science in Cyber Security & Privacy

Rajiv Gandhi Proudyogiki Vishwavidyalaya, Bhopal, India J une 2015 Bachelor of Engineering in Computer Science & Engineering TECHNICAL SKILLS:

Cyber Skills:- P enetration testing, Vulnerabilities assessment, Network traffic analysis, Security Information and Event Management, Web Proxy, Cookies Hijacking, Information Gathering, Disassembler, Firewall Configuration Security analysis, Security awareness, Intrusion detection, Information security, Risk assessment, Risk analysis, Security controls, Active Directory, System security, Microsoft Windows, NIST SP 800 Series, Security engineering, Technical support, System administration, Amazon Web Service, Terraform.

Networking:- L AN, WAN, WLAN, DNS, VPN, TCP/IP Protocols, Ethernet, SSL/TLS, IP Lookup Configuration, BGP.

Tools:- W ireshark, Retina, Nessus, Acunetix, Bro, ELSA, Nmap, ArcSight, Burp, IDA Pro, OWASP Zap, Maltego, Splunk, Metasploit, Virtualbox, SOT, Pfsense, VMware. Programming language:- J avascript, Python, C, C++, Java, DBMS, SQL. Operating System:- Unix-Linux, Windows, Kaali, Mac OS. Certification:- C ertified Ethical Hacker, Information security, C omputer Network and Hardware Engineering. EXPERIENCE:

Appin Technology, India ( Security Analyst) June 2014 - June 2016 Position : Security Analyst

● Plan, Implement and upgrade security measures and controls.

● Establish Plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction.

● Maintain data and monitor security access and coordinate security plans with outside vendors.

● P erform Vulnerability testing, Penetration testing, Risk analysis and Security assessments.

● I nternal and external IS/Cyber Security risk assessments & audits.

● Anticipate security alerts, incidents and disasters and reduce their likelihood, End user support and troubleshooting.

● Assessing security risks that impact the business.

● Lead response and investigation efforts into advanced/targeted attacks.

● Manage Network, Intrusion detection and prevention systems.

● Analyze security breaches to determine their root cause.

● Experience in drafting reports, documenting case details and able to summarize findings and recommended and install appropriate on system analysis.

● A dministering, supporting, and implementing IPv4 Networks (switch, router, firewall, and wireless access points)

● Write/develop System Security Plans (SSP) and Tenant Security Plans (TSP).

● Recommended and install appropriate tools and countermeasures

● Define, implement and maintain corporate security policies.

● Review security events that are populated in a Security Information and Event Management (SIEM) System.

● Train fellow employees in security awareness and procedures. PROJECTS:

IPTables Firewall Configuration May 2017

Configure packet filtering IPTables firewall in Linux. Allowed/Denied from different IP addresses and ports as per project requirements.

SSL/TLS Man In The Middle Attack A pril 2017

Compromised information sent between the user and the supposedly secure webpage, by acting as a man-in-the-middle. Successfully showed secure connection (https) on the user side when actually the target was vulnerable.

Switch Configuration April 2017

Layer 2 & Layer 3 configuration & Layer 2 & layer 3 Security. To configure the default gateway for the switch, use the ip default-gateway command. Enter the IP address of the default gateway. The default gateway is the IP address of the router interface to which the switch connects.

Network Mapping, Vulnerabilities & Host Exploitation Feb 2017 Assessing the target for vulnerabilities using penetration tools like Nmap and Nessus using Kali Linux, the first step of social engineering. Successfully gained shell access of the target virtual PC using Meterpreter and Backtrack. Was able to copy files from the target, take a screenshot etc. IP Lookup Algorithm Jan 2017

Designed two different IP lookup algorithm in C++. (1) Disjoint-prefix Binary Trie, (2) Binary search on prefix. Enhanced IP lookup performance by efficient usage of these algorithms. Protocol Mediation Dec 2016

Protocol Mediation, that is, accept HTTP requests on one side and perform the actions of a nother protocol (FTP) on the other side.

Build an Internet Multimedia station November 2016 Design and implement a system that will transmit that content (as a Stream of UDP packets) over the network to a listener.

Web Proxy Oct 2016

Writing a web proxy to learn about how to structure servers. It accepts a new connection from a browser, completely handle the request and response for that browser, and then start work on the next connection. EXTRA CURRICULAR ACTIVITIES:

National Robotics Race and Robotics War Winner in Citronics Technical Fest 2014.



Contact this candidate