Post Job Free
Sign in

Network Security Risk Management

Location:
Allston, MA
Salary:
75000
Posted:
May 24, 2024

Contact this candidate

Resume:

PRITIKA PARIKH

Boston, MA (***) ******* ad5xmi@r.postjobfree.com http://www.linkedin.com/in/pritika-parikh GitHub EDUCATION

Northeastern University Boston, MA

Master of Science in Cybersecurity September 2022 – May 2024

Coursework: Cyberspace Technologies and Applications, Information System Forensics, Information Assurance, Risk Management and Assessment, Network Security Practices, Computer Systems Security. Gujarat Technological University Ahmedabad, GJ

Bachelor of Engineering (Computer Engineering) June 2018- May 2022

Coursework: Cybersecurity, Computer Networks, Operating Systems, Data Structures, Data Management Systems, Digital Fundamentals, Analysis and Design of Algorithms, Advanced Java, Artificial Intelligence, Information and Network Security. TECHNICAL SKILLS

Security: Cybersecurity, Information Security, Network Security, Endpoint Security, Application Security, Cloud Security. Analysis: Vulnerability Assessment and Management, Penetration Testing, Security Information and Event Management (SIEM), Incident Response, Threat Analysis, Log Analysis, Malware Analysis, Real-Time Monitoring. Tools and Technologies: Intrusion Detection/Prevention Systems (IDS/IPS), Security Orchestration Automation and Response

(SOAR), SIEM Tools (e.g., Splunk, ArcSight), Vulnerability Scanners (e.g., Nessus, OpenVAS), Wireshark, Metasploit, AWS, Azure, Docker, GCP, SSL/TLS, SQL, TCP/IP, firewall, DNS, ICMP, Cryptography, Source Code Analysis. Compliance: HIPAA, PCI DSS, GDPR, SOC 2.

Other: C/C++Disaster Recovery, Scripting (e.g, Python, PowerShell), Proxy, Regex. PROFESSIONAL EXPERIENCE

Mobile Heartbeat Boston, MA

Cybersecurity Consultant January 2024 - April 2024

• Led the creation of a comprehensive secure coding curriculum, emphasizing OWASP Top 10 vulnerabilities in Mobile, Web & API environments, demonstrating expertise in application security, while focusing on cross functional collaboration.

• Orchestrated hands-on practical challenges using Juice Shop by integrating it in the curriculum to simulate real-world scenarios, elevating participants cybersecurity acumen, showcasing innovative teaching methods and real-time monitoring.

• Pioneered an open-source Google Classroom platform to streamline learning and monitor participants’ advancement, showcasing technological facilitation for educational initiatives, open-source contributions, emphasizing cross functional collaboration. BrainyBeams Technology Pvt. Ltd. Ahmedabad, GJ

Cybersecurity Analyst September 2021- August 2022

• Executed vulnerability assessments employing industry-standard tools like Nessus and OpenVAS, discerning critical vulnerabilities, and proposing tailored risk mitigation strategies, leading to a 30% reduction in potential downtime while optimizing firewall configurations.

• Formulated and delivered 15 exhaustive threat intelligence reports, aligning MITRE ATT&CK frameworks and validating IOCs, significantly enhancing clients’ defense posture against cyber threats, focusing on details and documentation.

• Demonstrated adept communication with stakeholders, delivering explanations of technical concepts and risk management strategies, source code analysis, and firewall optimization with an emphasis on decision making.

• Utilized collaborative approaches and architectural insight to optimize security architecture and validate cybersecurity measures for maximum effectiveness.

ACADEMIC PROJECTS

Database Building Operations for Cybersecurity Application January 2024 – March 2024

• Championed the development of robust relational database system, resulting in a 20% increase in data retrieval efficiency.

• Designed and implemented schemas optimized for storing and retrieving security-related data, handling 10 million records with ease, with a focus on validation and compliance.

• Applied normalization techniques, reducing data redundancy by 30% and maintaining data integrity.

• Implemented robust security features (encryption, access controls) and conducted thorough testing, achieving 99% accuracy in database operations and encryption, while ensuring compliance with industry standards and business objectives emphasizing validation, release, and product security.

Cryptographic operations in Python - GitHub September 2023- December 2023

• Created a python program offering key generation and hash function operations, facilitating secure digital interactions.

• Engineered and integrated robust encryption algorithms for data privacy and security, including key generation, encryption, decryption, and data signing; increased system security by 50% and reduced unauthorized access incidents by 30%. Risk Analysis of an Organization January 2023 – April 2023

• Conducted a comprehensive study of an organization’s assets, identifying 30 weaknesses, 40 potential threats, 20 asset risks.

• Devised and executed a risk management implementation plan, resulting in the deployment of 15 cybersecurity controls with a focus on market needs, documentation, and cross functional collaboration.

• Utilized attack trees to pinpoint 5 critical paths, 25 vulnerabilities, and 10 key assets lacking cybersecurity controls.

• Drafted an exhaustive report with recommendations for 10 prevention and response controls, employing SANS templates, demonstrating skills in risk analysis, compliance.



Contact this candidate