Post Job Free
Sign in

Security Data

Location:
Annamalai Nagar, Tamil Nadu, India
Posted:
July 01, 2020

Contact this candidate

Resume:

SUDHARSAN

Mobile : +91-812******* Email : ************@*****.***

PROFESSIONAL OBJECTIVE

“To secure a challenging position where I can effectively contribute my skills, utilise my strength and give best result in cyber security and ethical hacking domain. ACADEMIC RECORD

B.E (Computer Science & Engineering) from Anna University 2018 passed out. AREA OF EXPERTISE

Networking Server Management

Network Security Ethical Hacking

Cyber Security

DOMAIN KNOWLEDGE

Cyber Security

• Was involved in solving cyber crime related and forensics cases which mainly involves information gath- ering, data encryption recovery, application recovery, vulnerability assessment & digital forensics.

• Experience in cyber security forensics aspects of multiple platforms, operating systems, software, communications, networking protocols and ethical hacking.

• Generating network vulnerability assessment reports and other ethical hacking vulnerability reports.

• Scan for network and web-based vulnerability detection assessments.

• Daily tasks to analysis and check security include monitoring incoming and outgoing data & overseeing privacy issues and event logs.

• Designing a plan of attack that can include exploiting software vulnerabilities, systemic vulnerabilities, social manipulation, or any combination of those factors.

• Scanning target networking and systems with commercial, open-source, or custom vulnerability detec- tion scanners.

Networking

• Configuring Routing protocols such as RIP, EIGRP, OSPF & BGP

• Routing and switching, ACL log management, LAN device monitoring

• Designing router administration which includes interface configuration,networking & routing protocols.

• Establishing connections with firewalls, IDS, IPS Troubleshooting network problems.

• OSI Model and computer networking (TCP/IP, Ethernet, VLANs) including knowledge of basic desktop and networking typologies.

• Networking - Setting up Hardware,VLAN, Sub netting, Routers, Switches.

• Protocols: TCP/IP, PPP, NetBEUI, Ethernet, Fast Ethernet, Token Ring, SMTP/POP3/IMAP, FTP, Telnet, SNMP, RMON, WINS, DHCP, DNS, OSPF, BGP, RIP, EIGRP.

• Knowledge of Local and Wide area networks (LAN/WAN),Hardware,Desktop, Internet, Telecommunica- tions and Data communications

• Experience with desktop network monitoring and packet analysis tools Day-to-day usage of industry standard cyber security tools with regards to ethical hacking. Microsoft Server 2008

• Active Directory management & Creation of group policies

• Backup & Recovery and OS patching/upgrades

• Software installs/upgrades

• Monitoring/alert configuration & Performance tuning

• Good knowledge of Windows Server 2008 administration, 2012 administration, 2016 administration, AD, group policy, DNS, DHCP, Terminal server.

• Cyber Security of data - and physical security administration of the servers themselves

• Apply OS patches and upgrades on a regular basis and monitor event logs in server.

• Upgrade administrative tools and utilities. Configure / add new services as necessary.

• Perform ongoing performance tuning, upgrades, and resource optimisation as required. Configure CPU, memory, and disk partitions as required.

Linux

• Install new/rebuild existing servers and configure hardware, peripherals, services, settings, directories, storage administration, etc. in accordance with standards and project/operational requirements.

• Linux server Builds configured with SAN Boot

• Troubleshooting OS related issues, hardware issues, Installing, updating packages in Red Hat Linux server administration using RPMs and YUM repositories.

• Install and configure systems which support infrastructure and/or R&D activities.

• Develop and maintain installation and configuration procedures.

• Contribute to planning and maintain system standards and prevents any threats and intrusion.

• Install and maintain security patches on the operational and development system and detection of threat and intrusion which includes but is not limited to, Red Hat Linux administration, Windows 2003/2008 administration, JBoss, VMWare, PostGreSQL, and Apache web services.

• Perform daily system monitoring, verifying the integrity and availability of all hardware, server re- sources, systems and key processes.

• Reviewing system, application logs and verifying completion of scheduled jobs such as backups.

• Perform regular security monitoring to identify any possible threat & intrusions.

• Perform daily backup operations, ensuring all required file systems and system data are successfully backed up to the appropriate media, recovery tapes or disks are created, and media is recycled and sent off site as necessary.

TECHNICAL TRAININGS

• Comptia A+ (Basics of Computer Hardware)

• Comptia N+ (Basics of Computer Networking)

• CCNA (Routing & Switching)

• MCITP (Server 2008)

• Ethical Hacking (CEH Version 9)

• Red Hat System Administration

SKILL SET

Operating System : Windows, Linux, Ubuntu, Kali Linux, Backtrack 5 R3, Parrot OS Programming Languages : C.

System Utilities : Microsoft Office 2010, Open Office.Org, Hexedit Web Application Testing : Burpsuite

SIEM Tools : Splunk

Server Enumeration : Httrack, Email Tracker Pro, Web Data Extractor, Path Analyzer Pro Applications : Adobe Photoshop

Database : Ms -Access,Sql Server, MySQL 5.1

Protocols : TCP/IP, UDP, HTTP, HTTPS, SMTP, ICMP, DNS, DHCP Routing Protocols : RIP, EIGRP, OSPF, BGP

Simulators : Packet Tracer

Spoofing Tools : Technitium, SMAC

Vulnerability Scanners : Netsparker, W3af

Network Scanners : Nmap, Zenmap, Nessus, Angry IP Scanner Network Sniffers : Ettercap, Ferret & Hamster, Driftnet, Urlsnarf DNS Enumeration : DNSdict6, DNSenum, DNSwalk, DNSrecon, LBD, Maltego Traffic Analysers : Wireshark, Tshark, Xplico, Network Miner Wireless Analysis : Wifi Pumpkin, Fluxion

Firewalls : Cisco ASA 5500

Exploitation Tools : Metasploit Framework, Armitage, Beef, SET, Reverse Engineering : Ollydbg, APKtool, Flasm, EDB Debugger Data Recovery : 7 data recovery, Recuva,

Proxy Softwares : Freesurf, Hotspot Shield, Manual Proxy Configurations. PERSONAL DETAILS

Date of birth : 28-09-1996

Language known : Tamil, English.

Permanent Address : 63-A/27, Padake Gounder St.,Ondipudur, Coimbatore-641016 I, Sudharsan, hereby confirm that the information given above is true to the best of my knowledge and be- lief. Place: Coimbatore SUDHARSAN



Contact this candidate