Sign in

Security Information Technology

Dallas, Texas, United States
October 31, 2016

Contact this candidate



**** ******** ***** ***#**** • Dallas, TX 75206 • 469-***-**** •

Professional Summary

A skilled IT engineer with fundamentals in networking and security seeking an internship/co-op position in Security Engineering.



CCNA Routing & Switching Cisco id: CSCO13028587

edX -LFS101x.2: Introduction to Linux Certification

Computer Networking:

Computer Security:


OSI, TCP/IP, RIP, OSPF, EIGRP, BGP, VLAN, VPN, Symmetric & Asymmetric Encryption

Encryption, Decryption, Secure Authentication, firewalls, OpenSSH, SSL, RSA, PKI, LDAP, Telnet/ping, Wireshark, Aircrack-ng, NMAP, Security Onion, Packet Tracer, Learning Ethical Hacking (CEH).

C, C++, JAVA

Web Technologies:



MySQL, MS access, SQL Server

Programming & Scripting:


Operating System:

Windows, Linux (Kali-Linux)


Southern Methodist University, Dallas May 2017

Masters of Science in Security Engineering GPA 3.6

Relevant courses: Computer System Security, Operating Systems and System Software, Data and Network Security, Software Security, Software Testing and Quality Assurance, Software Reliability and Safety, Advanced Network Security, Cryptography and Data Security, Advanced Software Security, Digital Forensics

Acharya Nagurjuna University, India May 2013

Bachelor of technology Information Technology

Industry Experience

Office of Information Technology, Southern Methodist University, Dallas Aug 2016 – Present

As I am working Client Architecture, job responsibilities Data Cabling/Computer Facilities maintenance, Server Administration (Windows, Linux, Mac), Visual/Video conferencing support and Other Maintenance Services

Web Developer, D V Tech Services, India June 2013- July 2014

-Developed User-friendly website, fixed bugs from existing websites and technology consists of PHP, MySQL, XML, HTML, CSS

-Responsible for using software languages and other tools to create Web applications and for designing, coding and modifying websites, from layout to function and according to a client's specifications.

-Back up files from web sites to local directories for instant recovery in case of problems. Implement procedures for ongoing web site revision.

Academic Projects:

Attacking RSA Based Session using SSL/TLS, Southern Methodist University, Dallas Mar 2016

- Issues of all asymmetric is the way which encodes the data to be processed.

-Plaintext utilized as a part of the SSL/TLS makes a side channel that permits an attacker to transform the RSA encryption.

-The attacker to break the specific acknowledgment of RSA plan in numerous system based on encoding.

-The tests showed that two thirds of randomly chosen internet servers were vulnerable, the attack is an extension of Bleichenbacher’s

A certificate Revocation in MANET (Mobile Ad-Hoc Network), Acharya Nagurjuna University, India May 2013

-Certificate revocation is an important role in securing a network. When the certificate of a malicious node is revoked, it is denied from all activities and isolated from the network.

-The challenge for certificate revocation is to revoke the certificate of malicious node promptly and accurately, the number of nodes capable of an accusing malicious nodes decreases overtime.

-With the increased focus in wireless communications, mobile ad hoc networks are attacking much attention in recent years

Scheduling of computing service, Acharya Nagarjuna University, India Oct 2012

-Computing services through their intranet networks available resources be used as virtual clusters for scientific computation during idle periods such as nights, weekends, and holidays.

-Generally, these idle periods do not permit to carry out the computations completely.

-Resource constraints: the network bandwidth, the disk bandwidth, and the delay T imposed for releasing the workstations.

Contact this candidate