Post Job Free
Sign in

Security Manager

Location:
Banjara Hills, Telangana, India
Posted:
May 23, 2019

Contact this candidate

Resume:

Joshi Kotari

Houston, Texas, ***** • ****************@*****.*** • 518-***-****

CAREER OBJECTIVES:

Extensive knowledge of security vulnerabilities, solutions, and risks in IT. Highly organized and top attention to detail. An ability to work together with a large team. Skills with multitasking and time management

Work Experience

Cyber Security Specialist, ManTech, Columbus, OH from Dec 2017 to Dec 2018

• Extensively analyzed project proposals from various operational teams within the Department of Information Technology to mitigate vulnerabilities.

• Reviewed Nexpose, AppScan, and Imperva scans to confirm whether systems and internal applications continue to report vulnerabilities.

• Utilized FireEye to thoroughly analyze phishing and spam correspondences submitted through Service Desk Manager to mitigate malicious malware from affecting employee’s workstations.

• Monitored various LogRythm alerts to investigate potential anomalous activity and initiated follow-ups to countermeasure network attacks, insider threats or compromised accounts.

• Tested Risk Acceptance Application user stories in both development and quality assurance environments.

• Reviewed URL requests via Virus Total and Palo Alto network software to assist with rejecting and granting access to policy approved business-related categories and websites.

Cyber Security Intern

Computer Science Corporation,Columbus, OH, Jan 2017 to Oct 2017

Ensure network, systems and data availability and integrity through preventative maintenance.

Implemented company policies, technical procedures and standards.

Recommended network security standards to management.

Managing firewalls, network and server monitoring.

Cyber Security Specialist, InfoSec, India from Jan 2015 to Dec 2015

Compiled daily database reports to identify possible vulnerabilities.

Reviewed system access data and monitored database access.

Updated cyber security protocol and also updated security software to prevent database security threats.

Ensured compliance with internal and external email safety standards.

Hall of Fame

Reported a bug on one of the company’s website.

Bug is related to no spoofing protection on Email domain.

Successfully listed the bug and received 2 points.

Professional Courses:

ICS/SCADA Cyber security

Cybersecurity for Industrial Control System – Mapping IT Defense-In-Depth Security Solutions to ICS

Cybersecurity for Industrial Control Systems - Current Trends (Threats)

Cybersecurity Nexus- CSX

Microsoft MTA Security Fundamentals: 98-367

ISC2 Systems Security Certified Practitioner (SSCP)

SKILL SET:

Programming Languages: JAVA, .NET, R-Studio, Python, C++

Tools: Tableau, Microsoft Project, IBM SPSS

Vulnerability Assessment Penetration Testing

Technical Risk Assessment Report

Risk Assessment

Data privacy applications

Intrusion detection

Malware analysis and reversing

Educational Qualifications:

Master of Science, Applied Security and Analytics

The University of Findlay, Findlay, OH

Bachelor of Technology, Computer Science

Jawaharlal Nehru Technological University Kakinada, India



Contact this candidate