***** * ******* ***, **********, CO 80016
Mob: 347-***-**** Email: email@example.com
Expertise in: Computer Security- Network Security- Application Security- Operating Systems- Reverse Engineering- Penetration Testing and Vulnerability Analysis- Digital Forensics- TCP/IP- Routing Protocols- Software Development- Software Engineering- Threat Modeling- Design and Algorithm Analysis- OWASP EDUCATION
Master of Science: Cybersecurity (GPA: 3.56) MAY, 2017 NEW YORK UNIVERSITY, Tandon School of Engineering, Brooklyn, NY Bachelor of Technology: Computer Science (GPA: 3.35) JUNE, 2015 Guru Gobind Singh Indraprastha University, New Delhi ACADEMIC PROJECTS
-- Developed network architecture for a global company. Key roles of the project were to build new IP addressing schema, Redesign local LAN, use the relevant protocols keeping security in mind and improve the throughput and efficiency.
-- Did the application security assessment of the open- source project Tunnelblick. Key roles were to identify design weakness, use static and dynamic security tools to study the security model, develop improvement guidelines and write a bug report, and develop a coding standard.
-- Created a password manager by using different Cryptographic functions, Hashing, DES, RSA, Salting.
-- Made a program on Cloud Storage Forensics which find and show that a number of artifacts are left behind after the deletion, unlinking, and uninstalling of cloud storage application. It can be very useful for forensic investigations.
-- Completed various labs on heap exploitations, Memory corruption vulnerabilities, Heap manipulation, shell code attacks, constructed ROP chains.
-- Tools: Nmap, Metasploit, Nessus, Burp Suite, ZAP, IDA Pro, Nexpose, WinDbg, Autopsy, NetworkMiner, HP Fortify
-- Database Development: MS Access, MYSQL, SQL
-- Pursuing Offensive Security Certified Professional (OSCP) WORK HISTORY
Security Engineer Dish Network JULY 2017-PRESENT
-- Responsible for working with developers to incorporate security in the SDLC.
-- Responsible for measuring security threat level for internet and intranet facing applications.
-- Responsible for manual penetration testing of Web applications and validating required fix has been made.
-- Running static/dynamic security scans like Fortify, Acunetix, Netsparker, etc on web applications, APIs, mobile applications and vet out the false positives to ensure secure coding practices are being followed.
-- Work closely with the developers to guide them analyze, assess and respond to various security threats
-- Responsible for making sure the company is PCI compliant and all the sensitive information for the customers are correctly masked by going through logs in PROD and TEST environment.
-- Automating day to day security testing and reporting tasks. Web Developer New York University Brooklyn, New York SEPTEMBER 2016-MAY 2017
-- Responsible for designing, coding and modifying websites, from layout to function.
-- Create visually appealing sites that feature user-friendly design and clear navigation. Cybersecurity Intern Citizens Crime Commission of New York City OCTOBER 2015-SEPTEMBER 2016
-- Worked with the Sr. Network Security Engineer on IDS.
-- Developed theoretical and security proposal for Intelligent Tutoring System for NSF using AI and behavior recognition tools.
-- Prepared cybersecurity awareness training materials for Internet of Things and Password Protection, quizzes and by co- designed a behavior game for learning for undergraduate students.
-- Created cyber-risk prevention and awareness training modules for the freshmen for Fordham University. LEADERSHIP
-- Actively participate in NYU hack nights and get the hands on new skills every week.
-- Attended various conferences on cybersecurity, and also the United Nations general assembly high level meeting.
-- Presented a paper and the talk at the Fourth Annual Conference on Governance of Emerging Technologies: Law, Policy, and Ethics on The Pitfalls and Promises of Artificial Intelligence: Artificial Intelligence Governance Model.