Post Job Free

Resume

Sign in

REST API, Web Applications, AI/ML/DL,Developer,Analyst

Location:
Knoxville, TN
Posted:
August 16, 2023

Contact this candidate

Resume:

Moumita Samanta

US Status: Green Card Holder

Email: adyzi9@r.postjobfree.com, adyzi9@r.postjobfree.com Phone: 872-***-****

I am an expert Security Engineer and Data analyst, having over 5 years of first-hand experience in Python, C and multiple years in JavaScript, HTML, PL/SQL in both the Industry and Academic environment. I am adept at con- ducting thorough vulnerability assessments, implementing robust security measures, and responding swiftly to security incidents. I have Strong knowledge of industry best practices, regulatory compliance, and emerging threats. I also design Data Modeling and Data Analysis using Machine Learning and Deep Learning techniques. I am Georgia Tech Graduate with specialization in Systems and Security; and highly motivated, innovative, results focused, enthusiastic about coding, debugging and learning new concepts. Key Skills

Programming Languages: Python, C, JavaScript, Shell-script, HTML, PL/SQL Platform: Unix/Macintosh, Linux, Windows

IDE tools: Pycharm, Jupyter Notebook, WebStorm, Node.js, FireBase, Django Security tools: Snort (IDS/IPS/Firewall), Cuckoo (malware-analysis), Mininet, Wireshark, Nmap, BurpSuite Machine/Deep learning tools: Keras, Tensorflow, Scikit-learn, Panda, Networkx, Libsvm Data Analysis/visualization tools: Power-BI, Tableau, Pandas, Seaborn, Matplotlib, D3.js Network Model Protocol: DNS, SMTP, SNMP, TCP/IP, Routing Protocol (RIP,OSPF,BGP), HTTP/HTTPs Security Protocol: SPF, DKIM, DMARC, SOP, CORS, CSP, SSL/TLS Employment and Experiences

Dec 2021- MetLife

Present IT Risk, Security & Business Continuity Analyst - Application Security

• Efficiently mine, clean, manipulate very large volume of secure data using pandas

• Design reports and threats/malware/flaws analysis dashboard using Power-BI that visualize company performance. Also using DAX methodology in Power BI enable dynamic filtering of data models.

• Analyze data and extract useful statistics and insights using Machine learning and Deep learning tech- nique to drive meaningful improvements to risk mitigation, flaws analysis and customer experience.

• Assist in operational and security-related control and risk assessments to ensure compliance to regula- tory and statutory requirements, as well as industry specific guidelines

• Automate the extraction and storing in csv/exel format using APIs and Python

• Maintain detailed data dictionaries and documentation for all analysis process ad solutions.

• Develop operational reports and presentations using Excel and Power Point Sep 2021- Envisensai LLP

Nov 2022 Principle Developer

• Developed end-to-end automated data pre-processing and modeling pipeline using ML/DL algorithms

• Developed surrogate model and edge-computing enabled architecture of the ML/DL pipeline for local use

• Designed full-stack website using Node.js and Firebase. Also add REST-APIs for data handling and improve data functionality.

• Provided secured login, registration and account management for customer and developer using Google Cloud APIs

• Developed data-visualization platform using D3.js for end user. July 2021- University College London

Dec 2021 Machine Learning Engineer (visiting)

• Developed Deep Learning based Autoencoder workflow for biophysical and Computational pharmacol- ogy as required by the domain scientists

• Developed packages for pre- and post-processing codes for data curation, efficient data management, data handling and visualization

• Upgraded and optimized Deep Learning code-base to take advantage of state-of-the-art Python and CUDA libraries for efficient GPU uses

• Participated and helped analysing the data and created automated procedure for data plotting and interactive analysis

Jan 2017- University of Illinois at Chicago, Chicago, Illinois Dec 2018 Teaching/Research Assistant, Department of Computer Science

• Proctored exams, Graded assignments, Prepared materials/lecture for lab-demonstration, Holding office hour for doubt clearing and student assistance.

• Experimented on access control enforcement mechanisms like SOP, CORS, CSP on the web.

• Performed behavioral analysis of API calls those are responsible for Browser Finger-Printing. May 2018- Oak Ridge National Laboratory, Oak Ridge, Tennessee July 2018 ASTRO Intern, Computational Sciences and Engineering Division

• Build robust and scalable framework for unmixing of large set of hyper-spectral images using non-linear machine learning and deep learning techniques.

• Developed efficient, computationally cheap and faster methods for dimensionality reduction for large data-set using fewer parameters without loosing intrinsic characteristics.

• Compared among different Machine Learning and Deep Learning techniques to set-up benchmark results on GPU based machines

Aug 2014- Indian Statistical Institute (Institute of National Importance), India Dec 2016 Project-linked-Person, Developer

• Developed tool for secure query processing for Semantic Web Application using Java and SPARQL

• Build a model for online social network based on trust value calculation

• Enhance the knowledge in graph analytics and graph theory Sep 2011- M/s INFOTECH

June 2012 Software Faculty

• Taught programming language like C & Java

Education

2020-2021 Master of Science (M.S.)

Georgia Institute of Technology

Computer Science, Remarks: GPA 3.80

Courses: Applied Cryptography, Network Security, Information Security, Secure Computer Systems, Cyber Physical System Security, Computer Networks, Network Science, Adv Operating System, Grad Algorithms, HPC

2012-2014 Master of Engineering (M.E.)

Indian Institute of Engineering Science and Technology, IIEST (Institute of National Importance), India Information Technology & Engineering, Remarks: First Class (80.94%) 2007-2011 Bachelor of Technology (B. Tech)

West Bengal University of Technology, WBUT, India

Heritage Institute of Technology, India

Computer Science & Engineering, Remarks: CGPA 8.44 Academic Experience

Study protocols for secure e-mail transfer

Description: This project is all about the analysis of the security related e-mail protocols like SPF, DMARC, DKIM, STARTTLS, MTS-STS and measure the internet wide of its implementation. Technologies: Python, shell script

Implementing Ethos operating system in Go language Description: This project is based on Ethos OS where I was implementing hierarchical object model for a document-type with some specific features for a web-API Technologies: Go language

M.E. thesis

Title: Fault-Tolerant Wireless Sensor Network

Description: Technological advancements in communications have led to the proliferation of Wireless Sensor Networks (WSNs) in a wide variety of application domains. One commonality across all WSN application domains is prolonged lifetime. Fault Tolerance in Wireless Sensor Networks can attain this requirement. For that, entire network is divided into clusters and one node is chosen as cluster head in each cluster. To increase the longevity of the cluster head, cluster head’s responsibility is distributed among its neighbouring nodes. Another approach to elongate the network lifetime is choosing an efficient routing protocol. In routing the relay nodes are selected such a way, those are nearer to the cluster heads and belong to the minimal path coverage area between the source node and the destination node. So, it reduces the total transmission path

Technologies: Matlab, programming in C

B. Tech thesis

Title: Biometric Authentication Based on Retina

Description: Retina recognition is a biometric technique that uses the unique patterns on a person’s retina for person identification and the false acceptance ratio is low. In this project, a retinal-database is constructed collecting a hundred number of colourful retinal images. Then the features like the diameter of the optical disk, the curvature of retinal vein are extracted and stored them into a database. When a new image comes in, its features are extracted and compared with the stored database. If it matches up to a threshold, the new image is authenticated

Technologies: Matlab, Java

B. Tech 3

rd Year - Summer Training

Title: Online Art Gallery

Description: Design a website where users can upload or download images, make comments, can issue request to buy an image online specifying the image ID Technologies: ASP .Net in C#, Microsoft Studio

B. Tech 2

nd Year - Summer Training

Title: RDBMS (Relational Database Management System) Description: Basic programming

Technologies: Sql, Pl/Sql, Oracle 9I

Publication

• Moumita Samanta, Pinakpani Pal and Abhik Mukherjee, Prevention of information leakage by modulating the trust uncertainty in Ego-Network, 9th International Conference Communication Systems and Networks (COMSNETS), 2017 pp377-378.

• Moumita Samanta, Pinakpani Pal and Abhik Mukherjee, A Novel Scheme for Abatement of Pri- vacy Concern by Controlling the Reachability in Online Social Network, Soft Computing and Pattern Recognition (SoCPaR) 2016 International Conference, Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoC- PaR 2016) pp 686-697,

Book series: Advances in Intelligent Systems and Computing

• Moumita Samanta and Indrajit Banerjee, Optimal Load Distribution of Cluster Head in Fault- Tolerant Wireless Sensor Network, Electrical, Electronics and Computer Science (SCEECS), 2014 IEEE Students’ Conference pp 1-7.

• The dynamics of Dengue Virus Methyltransferase subtypes: Same-same but different (In preparation).

• Structural dynamics of Urease accessory protein UreG Conformational flexibility of kRAS oncoprotein (In preparation).

Scholarship/Grants

• 2012: Graduate Aptitude Test in Engineering (GATE), conducted nationally by the Indian Institute of Science (IISc) and Indian Institutes of Technology (IIT) on behalf of the Department of Higher Education

• USENIX Security ’21 Diversity Grant

• GREPSEC V Workshop 2021 participant

Conference/Workshop Attended

• 11

th International Conference on Information Systems Security, Dec 2015, Jadavpur University, Kolkata

• Tutorial on Information Systems Security, Dec 2015, Jadavpur University, Kolkata

• 4

th International Conference on Emerging Application of Information Technology, Dec 2014, ISI, Kolkata

• Workshop on Data and Security, Sep 2014, ISI, Kolkata

• National Workshop on Networks and Distributed Algorithms, Mar 2014, ISI, Kolkata

• Research Promotion Workshop on Recent Trends in Computing, May 2013, IISET, Shibpur

• Research Promotion Workshop on Introduction to Graph and Geometric Algorithm, Mar 2013, IIEST, Shibpur



Contact this candidate