Post Job Free

Resume

Sign in

Social Media Machine

Location:
Los Angeles, CA
Posted:
April 03, 2020

Contact this candidate

Resume:

Sarthak Goyal

***** ************ **, *******, **-94539 • adcmc2@r.postjobfree.com • +1-510******* • US Permanent Resident OBJECTIVE

Seeking a Challenging Assignment with a Progressive Organization that can provide opportunities for knowledge and career growth in the Computing/Research Field.

EDUCATION

University of Southern California, LA, CA, USA August 2018-Present

• M.S. in Computer Science

R.V. College of Engineering, Bangalore, India August 2014-May2018

• B.E.in Computer Science and Engineering, GPA:8.79/10 TECHNICAL SKILLS

Programming Skills: Proficient in C, Python, Basics of Java and C++, MySQL, PHP, CSS, HTML, Machine Learning, UNIX., Network Programming, GNU Debugger, Exploring Blockchain Tendermint. Courses: LINUX, Penetration Testing, Web Proxy, Network Intrusion Detection Systems, Network Programming, Operating Systems, Database Systems, Advanced Algorithms, Secure Systems Administration, Advanced Mathematics, Probability, Computer Oriented Architecture, Active Directory, Computer Networks, Advanced Cryptography, Zero Knowledge Proofs. EXPERIENCE

Cyber Security Intern, Bharat Electronics Limited, Delhi, India June 2016-July2016

• Studied and Deployed network Intrusion Detection Tools.

• Designed Firewalls for end hosts as well as network devices for a complex network communication project.

• Designed Linux iptables rules for various hosts to allow data only their communication architecture to flow in and out of a host. Machine Learning Intern, FOX Innovation Labs,21st Century FOX, LA, CA October2018-December2018

• Training of audio data sets to be able to classify a 10sec WAV file into different audio categories.

• Designing a Custom model for FOX-MICROSOFT audio-data set and classifying the samples for prediction scores based on the types of gunshots in the WAV-file which was the Deadpool 2 movie. Cyber Security Intern, Grant Thornton LLP San Francisco, CA June 2019-August 2019

• Automating Nessus Vulnerability Scanning tool as Nessus 7+ doesn’t support API.

• Pulling out required columns from Nessus reports and presenting all the required as a CSV to be presented to the clients.

• Understanding JIRA ticketing system framework and SAML use cases in Okta for IAM.

• Research on how current laws (GDPR, e-privacy, CCPA) affect customer’s consent and preference mechanism and how the current privacy regulatory landscape could impact on how company design, implement and manage customer’s consent mechanism.

PROJECTS

Cloud Security Based Project

• Made a Secure Shell server in which 5 PCs were associated in LINUX OS.

• Exhibited various routes for information breaking (XSS, Cross-scripting etc.) and techniques to prevent those attacks. DBMS Based Project

• Proposed an electricity bill management system, making a more user-friendly system of paying, accessing, inserting and deleting billing records.

• The backend was phpMyAdmin and the front end was designed using HTML, CSS and PHP.

• This allowed users to manage their billings online. Compiler Design Based Project

• Created a 2 pass macro-processor using SIC/XE.

• This allowed all macro definitions to be processed during first pass and invocations expansion during the second pass. SNORT/IPTABLES/AIDE Secure Systems Administration Project

• Created custom Snort and Iptables Rules to monitor and filter traffic.

• The traffic was later analyzed as log files for any malicious activity. Red Team Project

• Broke into a MySQL backend server and got the passwords corresponding to the user which had an account on the website which the team was supposed to login.

• The above was achieved using SQL-injection on the back end. IPSEC VPN Tunnel Project

• Created an IPSECVPN tunnel to send encrypted traffic (ESP packets) from client to server to prevent phishing.

• This allowed secure communication between the 2 end points. Network Security Based Project

• The setup consisted of 5 VMs (3 were Ubuntu 14.04, 1 Windows 2012 R2 Server and 1 Kali Linux), where the goal was to add an Ubuntu user in the Active Directory of the Windows 2012 R2 so that an ubuntu user can login into the windows machine. This was achieved by using Samba and win-bind.

• 2 VMs were connected using a tunnel and acted as routers between 1 ubuntu and windows machine.

• Lastly the kali machine was used to pen-test the windows and ubuntu machine looking for vulnerabilities using OpenVAS and later fixing them.

Malware Analysis using Machine Learning

• Detecting malware with various deep learning models (CNN-SVM, GRU-SVM, MLP-SVM) using the Microsoft Kaggle Malimg dataset.

• Google TensorFlow was used to implement the deep learning algorithms and the experiments were performed on a laptop with Intel(R) Core (TM) i7-8750 H CPU @ 2.20Ghz 2.21 Ghz with 32.0 GB of DDR4 RAM and NVIDIA® GeForce RTX™ 2060 6GB GDDR6 (OC Ready) GPU which showed that the GRU-SVM stands out among the DL models. Identifying Fake Social Media Profiles for The US Military

• Currently working with the US Military helping them analyze fake social media profiles for top Army Generals using Machine Learning.

• It is a part of Mad Scientist Program by the US Government. EXTRA-CURRICULAR ACTIVITIES

• Led the college department Tennis Team and took part in various other sports events.

• Dynamic member in administration and publicity group of college fest.

• Volunteered for Rotaract Club of RVCE to donate blood and in paper drive events to raise money for underprivileged children.

• Collaborated with 4 other students to secure 2nd place by developing line follower code in an Arduino workshop.

• Member of a technical club ASTRA: Basics of Image Processing.



Contact this candidate