Post Job Free
Sign in

Security Information Technology

Location:
Herndon, VA, 20170
Posted:
August 31, 2016

Contact this candidate

Resume:

EDUCATION

SAI PRAVEEN SADHU

****, ******** ***** **, *******, VA – 22030, 571-***-****, ******@***.***

GEORGE MASON UNIVERSITY (GMU) Fairfax, VA

Candidate for Master of Science in Information Security and Assurance; GPA 3.2/4.0 May 2016

Concentration: Applied Cyber Security

Relevant Coursework: Information Security Theory and Practice, Cryptography and Network Security, Computer Networks, Network Security, Operations of Intrusion Detection for Forensics, Malware Reverse Engineering, Security Laboratory, Security Audit and Compliance Testing, Federal Security Policy.

JNTU Hyderabad, India

Bachelor of Technology in Information Technology; GPA 3.44/4.0 May 2011

PROFESSIONAL EXPERIENCE

SRI PRATHNIK CONSULTING – Policy and Compliance Analyst Hyderabad, India – Sep 2012 – Sep 2013

Worked closely with clients to make sure they adhere established guidelines.

Updating policies as per organizations requirements.

Assisted Manger in Risk Management strategies

GLOBAL LOGIC TECHNOLOGIES – Policy and Compliance Analyst – II Hyderabad, India – Oct 2013 – July 2014

Worked at client location Google, and did thorough research on policies.

Monitored websites for any policy violations and marked them.

Documented day to day activities and trained employees on compliance.

GEORGE MASON UNIVERSITY – Research Assistant July 2015 – Jan 2016

Assisted in web development project for students and professors to gain better communication.

Involved in grading undergraduate student’s assignments and papers.

Solved issues in project work and other assignments when needed.

CERTIFICATIONS

Certified Ethical Hacker from US Council. Jan 2016

COURSE PROJECTS

StageFright Exploitation Oct 2015 – Dec 2015

Tools used – Kali, Nexus 5 – Android 4.4.2

oExplored, investigated StageFright bug in detail and the consequences for Android.

oExploited the bug using python script and demonstrated the vulnerability and its outcome.

oRecommended preventive measures that can make Android Operating system more secure.

ShellShock Vulnerability Feb 2015 – May 2015

Tools Used – Kali, Linux server vulnerable to ShellShock

oEvaluated the working of shellshock and the upshot of it.

oReviewed and exhibited a hacker approach to one of the vulnerable machines.

oApplied preventive measures to secure the vulnerable machine.

Malware Reversing – Trojan Horse, SRVCP.exe Feb 2015 – May 2015

Tools used – Windows XP SP3, REMnux, Process Explorer, Process Monitor, TCPView, Autoruns, Wireshark,

Regshot, IDA Pro Free, OllyDbg, INetSim, INSPIRCd

oPerformed static and dynamic analysis to get in depth working strategy and possible infected areas.

oExamined and studied the behavior of the Trojan in different environments and applying various conditions.

oProposed preventive measures on how to not get infected with this Trojan.

Wi-Fi Drone Exploitation Oct 2014 – Dec 2014

Tools Used - Backtrack, Netcut, Nmap, Kismet, Aircrack, Netstumbler, SWScanner, Wi-Fi Drone

oRecognized vulnerability while establishing a connection between drone and device.

oUsing the tools, we proved the weakness in WEP connection and connected attacker’s device remotely.

oImplemented Security measures on Drone that ensures Data Integrity.

SKILLS

Programming Languages: C, Python

Tools: Wireshark, Snort, Metasploit, Nessus Vulnerability Scanner, IBM AppScan, Malware Reversing, Wi-Fi Exploitation Tools, SIEM – QRADAR, Splunk.

Operating Systems: Windows, Mac, Kali, Backtrack, Linux.

Knowledge on: Buffer overflows, Intrusion Detection and Snort, Wireless Penetration Testing, Firewall and Host Defenses, Network Reconnaissance and Penetration, Web Application Security, OWASP 10, Denial of Service (DOS), Social Engineering, IDS/IPS, TCP/IP, Incident Response, Malware Reversing, Deep Packet Inspection & Analysis.

ACADEMIC ACTIVITIES

Active participant in “Patriot Hackers – George Mason University”.

Involved in several Cyber Security Meet-ups held at George Mason University.

Stood 1st for presenting “Malicious Code Works” at a National Level Technical Symposium, India.

Currently preparing for CEH.



Contact this candidate