Post Job Free
Sign in

Software Engineering Computer Science

Location:
Brooklyn, NY
Salary:
50000
Posted:
June 07, 2025

Contact this candidate

Resume:

Neeta Misericordia

MS Computer Science

Phone: +1-516-***-****

Email: *******@*******.***

PROFESSIONAL SUMMARY:

5+ years of combined academic and professional experience in computer science, with a growing specialization in software engineering and cybersecurity principles.

Strong foundation in programming languages such as Python, Java, and C++, with applied experience in building secure, scalable applications.

Passionate about cybersecurity with hands-on exposure to ethical hacking, network security, and threat mitigation strategies.

Skilled in working with Linux environments, using command-line tools, and understanding protocols like SSL/TLS, VPNs, and Firewalls.

Built and deployed projects involving user authentication, encryption, and modern web technologies (React, JavaScript, HTML/CSS).

Experienced with Agile methodologies, source control using Git, and collaborative development workflows.

Actively pursuing industry-recognized certifications (e.g., Security+, CEH, or CISSP) to expand cybersecurity expertise.

Analytical thinker with strong debugging and problem-solving skills, capable of quickly mastering new tools and environments.

Demonstrated ability to bridge technical and non-technical requirements and contribute meaningfully to software or security-focused teams..

TECHNICAL SKILLS:

Programming Languages

NET, ASP.NET, Java, SQL, PLSQL

Operating Systems

UNIX, Windows 95/98/NT/2000/XP, Linux.

Databases

MS-Access, MySQL, SQL Server, Oracle, DB2, RDMS, DBMS, Sybase

Application Servers

IBM WebSphere, ATG Dynamo

Internet:

HTML, XML, VBScript, ASP, JavaScript, JSP, J2EE.

Automation Tools

MS Visio, Rational Rose, Rational ClearCase, Rational RequisitePro, Documentum, DOORS, SharePoint

Bug Tracking Tools

Mercury Test Director, Rational ClearQuest

Utility Tools

MS Office Suite, MS Project, TOAD

Reporting Tools:

Crystal Reports, SQL Server Reports (SSRS)

Data warehousing Tools

Informatica, Business Objects, Erwin

Testing Tools

Quick Test Pro (QTP), Test Director, WinRunner, LoadRunner

PROFESSIONAL EXPERIENCE:

April 2021 –Nov 2024

Ubisoft – Gurgaon Delhi

Software Engineering Intern/Full-time Software Engineer

Responsibilities:

Collaborated with cross-functional engineering teams to support secure development workflows and implement security best practices in codebases.

Conducted vulnerability assessments using industry-standard tools and supported remediation efforts across backend systems and internal tools.

Participated in daily stand-ups and Agile ceremonies to align engineering goals with Ubisoft’s cybersecurity compliance standards.

Assisted in scripting automated security tests and helped monitor system logs to identify potential threats or unusual activities.

Developed internal documentation for onboarding engineers with secure coding guidelines, Git workflows, and infrastructure access protocols.

Supported integration of authentication protocols (OAuth2, SAML) into internal applications to enhance user and data security.

Gained hands-on experience with CI/CD pipelines, Docker, and cloud-based development environments.

Worked with senior engineers on a side project to optimize API security, contributing to both backend code reviews and basic pen testing.

Practiced secure software development lifecycle (SSDLC) principles to contribute to Ubisoft’s overall software quality and data protection strategy.

Saint John’s University - New York, NY. Oct 2022 to March 2024

Student Manager, Guest Services

October 2022 to March 2024

Responsibilities: • Ensured confidentiality and security of guest data, handling sensitive information such as guest registration details and special requests with discretion and in compliance with university policies.

• Implemented risk management strategies by identifying and addressing potential security risks in guest services processes and ensuring proper protocols were followed to protect personal data.

• Developed and enforced operational procedures that complied with university standards, ensuring the safety and security of students, visitors, and staff while on university premises.

• Managed and supervised a team of student workers, emphasizing the importance of security awareness and compliance with established procedures in all guest services-related tasks.

• Supported the integration of technology systems for check-ins, visitor tracking, and record-keeping, with a focus on securing systems from unauthorized access and misuse.

• Acted as a point of contact for handling sensitive issues, demonstrating a keen ability to solve problems and provide solutions in a timely and secure manner.

• Collaborated with various university departments to facilitate communication and ensure safe access to resources, mirroring cross-functional teamwork often required in cybersecurity incident response teams.

• Monitored and maintained inventory systems for guest services supplies, ensuring proper access controls were in place for sensitive equipment and systems.

Skills and Tools: Risk management and compliance procedures, Data privacy and confidentiality protocols, Problem-solving and incident management, Strong attention to detail and threat identification, Experience in securing systems and data handling.

Projects:

1. Secure Virtual Machine Environment Setup and Penetration Testing

Objective:

The primary goal of this project was to design and implement a secure virtual machine (VM) environment for penetration testing and vulnerability assessments. The project focused on creating a scalable, highly available infrastructure to simulate real-world environments while ensuring robust security and conducting security testing on various network setups.

Responsibilities:

Provisioned Virtual Machines (VMs) using VMware and VirtualBox for testing purposes, with the ability to scale based on workload requirements.

Implemented security best practices on VMs, including firewall configurations, disk encryption, and VPN setup for secure communications between virtual environments.

Conducted penetration testing using Kali Linux, Metasploit, and Wireshark to identify vulnerabilities in the VM infrastructure, network configurations, and running applications.

Created and tested multiple vulnerable environments (e.g., Metasploitable and OWASP Juice Shop) for training and ethical hacking purposes.

Configured load balancing using HAProxy to distribute traffic across multiple VMs, ensuring system performance and availability.

Applied automated security patches and vulnerability management practices to protect VMs from potential threats.

Worked closely with the development team to integrate security measures into the lifecycle of VM-based applications, ensuring compliance with industry standards and security protocols.

Conclusion and Impact:

Delivered a secure, automated VM environment for vulnerability testing and ethical hacking, improving the security posture of web applications and network infrastructures.

Enhanced troubleshooting and penetration testing capabilities, identifying and addressing critical security vulnerabilities before deployment.

Improved overall security awareness and system resilience by applying best practices in VM configurations and penetration testing.

Environment: VMware, VirtualBox, AWS, Kali Linux, Metasploit, Wireshark, HAProxy, VPN, Penetration Testing, Security Best Practices.

2. Cloud-Based VM Infrastructure for Load Balancing and High Availability

Objective:

The objective of this project was to design and deploy a cloud-based VM infrastructure using AWS and Terraform, implementing load balancing and high availability configurations to ensure seamless application performance under varying traffic loads.

Responsibilities:

Provisioned cloud-based VMs using Terraform and AWS EC2, automating the setup and scaling of resources to meet business requirements.

Configured load balancing with Nginx and HAProxy to distribute traffic across multiple VMs, ensuring high availability and fault tolerance.

Set up auto-scaling policies in AWS to dynamically scale the VM instances based on traffic patterns and resource utilization, minimizing costs and maintaining performance.

Implemented cloud security measures, including security groups, VPN, and firewalls to protect the VMs and ensure secure access to cloud resources.

Conducted performance testing and optimization to enhance VM response times and improve the user experience under different traffic scenarios.

Developed scripts for automated VM monitoring using Nagios and Prometheus, providing real-time insights into VM health and system metrics.

Managed backup and disaster recovery plans, ensuring the cloud infrastructure remained resilient against failures or unexpected downtime.

Conclusion and Impact:

Successfully built and deployed a highly available and scalable VM infrastructure in AWS, meeting business needs for performance and reliability.

Reduced infrastructure costs through efficient use of auto-scaling and load balancing, while maintaining consistent uptime and availability.

Enhanced cloud-based security and disaster recovery protocols, ensuring a robust and secure deployment environment for enterprise applications.

Environment: AWS, Terraform, Nginx, HAProxy, Prometheus, Nagios, Cloud Infrastructure, Load Balancing, Auto-Scaling, Security Best Practices.

3. Enhancing Procurement Efficiency with Security Integration

Objective:

The goal of this project was to enhance procurement efficiency by integrating advanced software with existing systems while ensuring that all data and processes were securely handled. The project focused on creating interactive dashboards, improving team collaboration through agile practices, and integrating robust security protocols to protect sensitive procurement data.

Responsibilities:

Participated in agile ceremonies (e.g., daily standups, sprint planning, retrospectives) to ensure seamless project management and collaboration.

Designed and refined Business Requirements Documents (BRDs) and Functional Requirement Documents (FRDs) to ensure alignment of business goals with secure technical deliverables.

Integrated data security protocols including data encryption, access control, and two-factor authentication (2FA) to secure sensitive procurement data across systems.

Managed over 100 tasks using Jira, ensuring task tracking and issue resolution were aligned with the security requirements.

Conducted Cost/Benefit Analysis and GAP Analysis, identifying inefficiencies and proposing secure, actionable improvements.

Developed interactive Tableau Dashboards that visualized procurement trends, incorporating secure data transmission to protect sensitive business information.

Implemented secure data flow, ensuring that procurement data was protected both in transit and at rest.

Utilized MS-Project to manage timelines and ensure the integration of security measures at every stage of the project.

Conclusion and Impact:

Enhanced procurement cycle times by integrating efficient and secure workflows, reducing operational costs while ensuring data security.

Improved team collaboration and transparency using Jira, with a focus on securely managing tasks and data access.

Created secure, data-driven Tableau dashboards that supported better decision-making, while ensuring compliance with security best practices.

Environment: Jira, Tableau, MS-Project, Azure, Data Encryption, Two-Factor Authentication (2FA), Access Control.

4. Customer Insights Analytics Platform with Secure Data Handling

Objective:

The goal of this project was to develop a comprehensive analytics platform for a retail client, providing real-time insights into customer purchasing behavior while implementing secure data handling procedures. The platform aimed to improve decision-making processes by 20% while ensuring that all sensitive customer data was protected throughout the system.

Responsibilities:

Facilitated multiple Joint Application Development (JAD) sessions with stakeholders to identify data security requirements alongside business needs.

Followed Waterfall methodology, ensuring clear and secure stages of the project: Requirements, Design, Development, Testing, and Deployment.

Created a Software Requirements Specification (SRS) Document, with a focus on secure data handling and compliance with industry security standards (e.g., GDPR, HIPAA).

Identified potential risks related to data security, including vulnerabilities in data integration from legacy systems and cloud-based data storage.

Worked with design teams using FIGMA to create wireframes for the platform, ensuring that security features were incorporated into the design.

Wrote SQL queries for secure data extraction, ensuring that encrypted data was handled properly during integration with AWS.

Helped ensure the platform was compliant with data protection regulations by integrating encryption, secure APIs, and data anonymization for customer data.

Worked with the development team to establish 10 Power BI dashboards, ensuring secure, encrypted connections to the data warehouse.

Assisted QA teams in data security testing to ensure all vulnerabilities were identified and resolved before deployment.

Conclusion and Impact:

Delivered a secure analytics platform that provided real-time insights into customer behavior, while ensuring the protection of sensitive data.

The platform enabled the client to identify and promote high-performing products, increasing revenue by 15% while maintaining data security compliance.

Enhanced stakeholder engagement through the secure sharing of actionable insights, promoting confidence in the platform's ability to handle sensitive customer data.

Environment: MS-Project, JIRA, Tableau, Power-BI, Data Encryption, Secure Data Handling, GDPR Compliance, AWS.

Education:

Saint John’s University January 2024 to November 2026

MS-Computer Science

Himalayan University June 2017 to July 2020

BHM



Contact this candidate