Mobile : Email :
PROFESSIONAL OBJECTIVE
“To secure a challenging position where I can effectively contribute my skills, utilise my strength and give best result in cyber security and ethical hacking domain. ACADEMIC RECORD
AREA OF EXPERTISE
Networking Server Management
Network Security Ethical Hacking
Cyber Security
DOMAIN KNOWLEDGE
•Was involved in solving cyber crime related and forensics cases which mainly involves information gath- ering, data encryption recovery, application recovery, vulnerability assessment & digital forensics.
•Experience in cyber security forensics aspects of multiple platforms, operating systems, software, communications, networking protocols and ethical hacking.
•Generating network vulnerability assessment reports and other ethical hacking vulnerability reports.
•Scan for network and web-based vulnerability detection assessments.
•Daily tasks to analysis and check security include monitoring incoming and outgoing data & overseeing privacy issues and event logs.
•Designing a plan of attack that can include exploiting software vulnerabilities, systemic vulnerabilities, social manipulation, or any combination of those factors.
•Scanning target networking and systems with commercial, open-source, or custom vulnerability detec- tion scanners.
Networking
•Configuring Routing protocols such as RIP, EIGRP, OSPF & BGP
•Routing and switching, ACL log management, LAN device monitoring
•Designing router administration which includes interface configuration,networking & routing protocols.
•Establishing connections with firewalls, IDS, IPS Troubleshooting network problems.
•OSI Model and computer networking (TCP/IP, Ethernet, VLANs) including knowledge of basic desktop and networking typologies.
•Networking - Setting up Hardware,VLAN, Sub netting, Routers, Switches.
•Protocols: TCP/IP, PPP, NetBEUI, Ethernet, Fast Ethernet, Token Ring, SMTP/POP3/IMAP, FTP, Telnet, SNMP, RMON, WINS, DHCP, DNS, OSPF, BGP, RIP, EIGRP.
•Knowledge of Local and Wide area networks (LAN/WAN),Hardware,Desktop, Internet, Telecommunica- tions and Data communications
•Experience with desktop network monitoring and packet analysis tools Day-to-day usage of industry standard cyber security tools with regards to ethical hacking. Microsoft Server 2008
•Backup & Recovery and OS patching/upgrades
•Software installs/upgrades
•Monitoring/alert configuration & Performance tuning
•Good knowledge of Windows Server 2008 administration, 2012 administration, 2016 administration, AD, group policy, DNS, DHCP, Terminal server.
•Cyber Security of data - and physical security administration of the servers themselves
•Apply OS patches and upgrades on a regular basis and monitor event logs in server.
•Upgrade administrative tools and utilities. Configure / add new services as necessary.
•Perform ongoing performance tuning, upgrades, and resource optimisation as required. Configure CPU, memory, and disk partitions as required.
+91-805******* adkiw8@r.postjobfree.com
iam currently pursuing B.E (ELECTRONICS AND COMMUNICAION ENGINEERING) in Kpr Institute Of Engineering Cyber Security
YOGESHWARAN M
And Technology.
Linux
•Install new/rebuild existing servers and configure hardware, peripherals, services, settings, directories,
•Develop and maintain installation and configuration procedures.
•Contribute to planning and maintain system standards and prevents any threats and intrusion.
•Install and maintain security patches on the operational and development system and detection of threat and intrusion which includes but is not limited to, Red Hat Linux administration, Windows 2003/2008 administration, JBoss, VMWare, PostGreSQL, and Apache web services.
•Perform daily system monitoring, verifying the integrity and availability of all hardware, server re- sources, systems and key processes.
•Reviewing system, application logs and verifying completion of scheduled jobs such as backups.
•Perform regular security monitoring to identify any possible threat & intrusions.
•Perform daily backup operations, ensuring all required file systems and system data are successfully backed up to the appropriate media, recovery tapes or disks are created, and media is recycled and sent off site as necessary.
TECHNICAL TRAININGS
•Comptia A+ (Basics of Computer Hardware)
•Comptia N+ (Basics of Computer Networking)
Operating System : Windows, Linux, Ubuntu, Kali Linux, Backtrack 5 R3, Parrot OS Programming Languages : C, C++, Java, Visual Basic. System Utilities : Microsoft Office 2010, Open Office.Org, Hexedit Web Application Testing : Burpsuite
SIEM Tools : Splunk
Server Enumeration : Httrack, Email Tracker Pro, Web Data Extractor, Path Analyzer Pro
: Nmap, Zenmap, Nessus, Angry IP Scanner
: Ettercap, Ferret & Hamster, Driftnet, Urlsnarf
: DNSdict6, DNSenum, DNSwalk, DNSrecon, LBD, Maltego
: Wireshark, Tshark, Xplico, Network Miner
Wireless Analysis : Wifi Pumpkin, Fluxion
: Cisco ASA 5500
Exploitation Tools : Metasploit Framework, Armitage, Beef, SET, Reverse Engineering
Data Recovery : 7 data recovery, Recuva,
: Freesurf, Hotspot Shield, Manual Proxy Configurations. PERSONAL DETAILS
Date of birth
Language known
Permanent Address
lief.
•Ethical Hacking (CEH Version 10)
•Red Hat Certified System Administration
SKILL SET
Database : Ms -Access,Sql Server, MySQL 5.1
Protocols : TCP/IP, UDP, HTTP, HTTPS, SMTP, ICMP, DNS, DHCP Routing Protocols : RIP, EIGRP, OSPF, BGP
Simulators : Packet Tracer
Spoofing Tools : Technitium, SMAC
Vulnerability Scanners : Netsparker, W3af
Network Scanners
Network Sniffers
DNS Enumeration
Traffic Analysers
Firewalls
: Ollydbg, APKtool, Flasm, EDB Debugger
Proxy Softwares
: 16-03-2001
: Tamil, English.
: 1/100,periyagoundapuram(po),karipatty(via),valapaddy(TK) I, yogeshwaran, hereby confirm that the information given above is true to the best of my knowledge and be- Place: salem YOGESHWARAN
storage administration, etc. in accordance with standards and project/operational requirement
•Troubleshooting OS related issues, hardware issues, Installing, updating packages in Red Hat Linux server administration using RPMs and YUM repositories.
•Install and configure systems which support infrastructure and/or R&D activities.