EDUCATION
SAI PRAVEEN SADHU
****, ******** ***** **, *******, VA – 22030, 571-***-****, ******@***.***
GEORGE MASON UNIVERSITY (GMU) Fairfax, VA
Candidate for Master of Science in Information Security and Assurance; GPA 3.2/4.0 May 2016
Concentration: Applied Cyber Security
Relevant Coursework: Information Security Theory and Practice, Cryptography and Network Security, Computer Networks, Network Security, Operations of Intrusion Detection for Forensics, Malware Reverse Engineering, Security Laboratory, Security Audit and Compliance Testing, Federal Security Policy.
JNTU Hyderabad, India
Bachelor of Technology in Information Technology; GPA 3.44/4.0 May 2011
PROFESSIONAL EXPERIENCE
SRI PRATHNIK CONSULTING – Policy and Compliance Analyst Hyderabad, India – Sep 2012 – Sep 2013
Worked closely with clients to make sure they adhere established guidelines.
Updating policies as per organizations requirements.
Assisted Manger in Risk Management strategies
GLOBAL LOGIC TECHNOLOGIES – Policy and Compliance Analyst – II Hyderabad, India – Oct 2013 – July 2014
Worked at client location Google, and did thorough research on policies.
Monitored websites for any policy violations and marked them.
Documented day to day activities and trained employees on compliance.
GEORGE MASON UNIVERSITY – Research Assistant July 2015 – Jan 2016
Assisted in web development project for students and professors to gain better communication.
Involved in grading undergraduate student’s assignments and papers.
Solved issues in project work and other assignments when needed.
CERTIFICATIONS
Certified Ethical Hacker from US Council. Jan 2016
COURSE PROJECTS
StageFright Exploitation Oct 2015 – Dec 2015
Tools used – Kali, Nexus 5 – Android 4.4.2
oExplored, investigated StageFright bug in detail and the consequences for Android.
oExploited the bug using python script and demonstrated the vulnerability and its outcome.
oRecommended preventive measures that can make Android Operating system more secure.
ShellShock Vulnerability Feb 2015 – May 2015
Tools Used – Kali, Linux server vulnerable to ShellShock
oEvaluated the working of shellshock and the upshot of it.
oReviewed and exhibited a hacker approach to one of the vulnerable machines.
oApplied preventive measures to secure the vulnerable machine.
Malware Reversing – Trojan Horse, SRVCP.exe Feb 2015 – May 2015
Tools used – Windows XP SP3, REMnux, Process Explorer, Process Monitor, TCPView, Autoruns, Wireshark,
Regshot, IDA Pro Free, OllyDbg, INetSim, INSPIRCd
oPerformed static and dynamic analysis to get in depth working strategy and possible infected areas.
oExamined and studied the behavior of the Trojan in different environments and applying various conditions.
oProposed preventive measures on how to not get infected with this Trojan.
Wi-Fi Drone Exploitation Oct 2014 – Dec 2014
Tools Used - Backtrack, Netcut, Nmap, Kismet, Aircrack, Netstumbler, SWScanner, Wi-Fi Drone
oRecognized vulnerability while establishing a connection between drone and device.
oUsing the tools, we proved the weakness in WEP connection and connected attacker’s device remotely.
oImplemented Security measures on Drone that ensures Data Integrity.
SKILLS
Programming Languages: C, Python
Tools: Wireshark, Snort, Metasploit, Nessus Vulnerability Scanner, IBM AppScan, Malware Reversing, Wi-Fi Exploitation Tools, SIEM – QRADAR, Splunk.
Operating Systems: Windows, Mac, Kali, Backtrack, Linux.
Knowledge on: Buffer overflows, Intrusion Detection and Snort, Wireless Penetration Testing, Firewall and Host Defenses, Network Reconnaissance and Penetration, Web Application Security, OWASP 10, Denial of Service (DOS), Social Engineering, IDS/IPS, TCP/IP, Incident Response, Malware Reversing, Deep Packet Inspection & Analysis.
ACADEMIC ACTIVITIES
Active participant in “Patriot Hackers – George Mason University”.
Involved in several Cyber Security Meet-ups held at George Mason University.
Stood 1st for presenting “Malicious Code Works” at a National Level Technical Symposium, India.
Currently preparing for CEH.