E L A N G O V A N G
E - M A I L I T Z E L A * * * 4 @ GMAIL.C OM
P H O NE 7 2 0 0 3 4 4 6 0 3
OBJECTIVE
Desirous of an IT Information Security role in a challenging workplace that welcomes innovative ideas and offers growth opportunities and positive environment for accomplishing projects. SUMMARY
• Knowledge in security technologies to include one or more of: IDS/IPS, vulnerability scanning/assessment tools, penetration tools, Wireshark, network access control system, data loss prevention, antivirus/malware, security and event management and visualization platforms and tools
• Worked in the tools like Nessus, NMap, Metasploit, and other vulnerability scanning tools.
• Basic understanding on secured Cloud computing platforms; especially using encryption for data at rest and in transit
• Application systems, network architecture, multiple platforms and new technologies from a security perspective to include, but not limited to, Firewalls; Windows Operating Systems; Networking (switches, routers, protocols, etc.); Network Services and Security Vulnerabilities; Network Architecture; Remote Access; Multi-factor Authentication; Platform Security
(Application, Database, OS); Antivirus; Cryptography; Active Directory
• Securing and managing security solutions
• System and network exploitation, attack pathologies and intrusion techniques (such as denial of service, sync attacks, malicious code, password cracking, etc.)
• Business needs with the ability to establish and maintain a high-level of customer trust and confidence in the security team
• Observational on network protocols, data flow analysis, and network design and troubleshooting
• Applying security risk assessment methodology in support of system development, including threat model development, vulnerability assessments, and resulting security risk analysis
• Depth principles and technology including access/control, authorization, Identification and authentication, public key infrastructure, network, and end point protection.
• Detail-oriented, with analytical, technical and problem solving skills
• Ability to work effectively in a fast-paced, high volume, deadline-driven environment
• Strong interpersonal skills and demeanor, along with the innovative ability to communicate with both technical and non-technical clients.
EDUCATIONAL QUALIFICATION
B. Tech, Information and Cloud Technology, VISTAS. Pursing M.sc Cyber Forensics and Information security. TECHNOLOGY SKILLS
Security:
Intrusion-detection, IDS/IPS, DLP, SIEM, vulnerability-scanning, Cryptography, Virtualization, and antivirus tools
Systems: Windows and virtualized
Tools: Nessus, NMap, Metasploit, VMWare
ADDITIONAL TRAINING PROJECT INFORMATION
• Published a paper on “Secure Endorsed Deduplication Cloud with Framework Security” in
“INTERNATIONAL CONFERENCE” held at VISTAS, Pallavaram,
• Organized and created models on Information technology in the Symposium events held at VISTAS.
• In plant training at Kaashiv infotech on Big data and Cloud Infrastructure.
• Attended workshop on “ETHICAL HACKING” in Kaashiv Infotech.
• Attended workshop on 'JAVA PROGRAMMING' in TCS - ION at Anna Nagar.
• Currently working on the Networking certification. PROJECT INFORMATION
Project name : Secure Detection of Similar Files in Cloud. Project details : This project is based on the Cloud Technology. It is one of important data mining techniques for eliminating duplicate copies of repeating data by it compares the data in the cloud storage to reduce the amount of storage space. Duration : 3 Months
Project Name : Data De-duplication
Project details : This is a web application in which we used JSP, Eclipse Juno, and My SQL 5.0.1
Algorithms: Advance Encryption System (AES), Secure Hash Algorithm (SHA1)