Joshi Kotari
Houston, Texas, ***** • ****************@*****.*** • 518-***-****
CAREER OBJECTIVES:
Extensive knowledge of security vulnerabilities, solutions, and risks in IT. Highly organized and top attention to detail. An ability to work together with a large team. Skills with multitasking and time management
Work Experience
Cyber Security Specialist, ManTech, Columbus, OH from Dec 2017 to Dec 2018
• Extensively analyzed project proposals from various operational teams within the Department of Information Technology to mitigate vulnerabilities.
• Reviewed Nexpose, AppScan, and Imperva scans to confirm whether systems and internal applications continue to report vulnerabilities.
• Utilized FireEye to thoroughly analyze phishing and spam correspondences submitted through Service Desk Manager to mitigate malicious malware from affecting employee’s workstations.
• Monitored various LogRythm alerts to investigate potential anomalous activity and initiated follow-ups to countermeasure network attacks, insider threats or compromised accounts.
• Tested Risk Acceptance Application user stories in both development and quality assurance environments.
• Reviewed URL requests via Virus Total and Palo Alto network software to assist with rejecting and granting access to policy approved business-related categories and websites.
Cyber Security Intern
Computer Science Corporation,Columbus, OH, Jan 2017 to Oct 2017
Ensure network, systems and data availability and integrity through preventative maintenance.
Implemented company policies, technical procedures and standards.
Recommended network security standards to management.
Managing firewalls, network and server monitoring.
Cyber Security Specialist, InfoSec, India from Jan 2015 to Dec 2015
Compiled daily database reports to identify possible vulnerabilities.
Reviewed system access data and monitored database access.
Updated cyber security protocol and also updated security software to prevent database security threats.
Ensured compliance with internal and external email safety standards.
Hall of Fame
Reported a bug on one of the company’s website.
Bug is related to no spoofing protection on Email domain.
Successfully listed the bug and received 2 points.
Professional Courses:
ICS/SCADA Cyber security
Cybersecurity for Industrial Control System – Mapping IT Defense-In-Depth Security Solutions to ICS
Cybersecurity for Industrial Control Systems - Current Trends (Threats)
Cybersecurity Nexus- CSX
Microsoft MTA Security Fundamentals: 98-367
ISC2 Systems Security Certified Practitioner (SSCP)
SKILL SET:
Programming Languages: JAVA, .NET, R-Studio, Python, C++
Tools: Tableau, Microsoft Project, IBM SPSS
Vulnerability Assessment Penetration Testing
Technical Risk Assessment Report
Risk Assessment
Data privacy applications
Intrusion detection
Malware analysis and reversing
Educational Qualifications:
Master of Science, Applied Security and Analytics
The University of Findlay, Findlay, OH
Bachelor of Technology, Computer Science
Jawaharlal Nehru Technological University Kakinada, India