Post Job Free
Sign in

Hands-On Sql Server

Location:
Dharmavaram, Andhra Pradesh, India
Posted:
October 31, 2025

Contact this candidate

Resume:

CHITRA SAI KUMAR

Software Enthusiast

Phone: +91-916******* Email: ****************@*****.*** LinkedIn: https://www.linkedin.com/in/chitra-sai-kumar-1324b6352/

Profile Summary

Good at Python and SQL with hands-on experience in backend development and working with databases. Can write clean code, manage data, and solve problems using Python. Comfortable with SQL queries and organizing data for applications. Know basic cybersecurity concepts like vulnerability assessment and pentesting. Familiar with tools like Nmap, Burp Suite, and Wireshark. Work well in teams, communicate clearly, and always ready to learn and improve Technical Skills

Category

Skills

Programming Languages

Python 3.9 (Data Analysis, Scripting, Backend development).

Database Management

SQL (Query writing, data retrieval, relational data base design).

Cybersecurity Basics

Vulnerability assessment, penetration testing concepts.

Security Tools

Nmap, Burp suite, Wireshark, OWASP top 10.

Platforms

Windows, Kali Linux.

Version Control

GIT, GITHUB.

Defect Tracking Tools & Method

JIRA, Confluence, Agile Methodology.

Soft Skills

Problem Solving, Self-learning, Adaptability, Communication Skills, Time Management.

Certificates

Deloitte Australia – Cyber Job Simulation

Education

BTech in Electronics and Communication Engineering 2021-2025

Jawaharlal Nehru Technological University, Kakinada, A.P., India

Intermediate, MPC 2019-2021

Sri Sai Krupa Junior College, A.P, India

Project Details

Project #1: Migration of Information to Azure

Project Name

DSB Azure Migration

Customer

DSB (Danske Statsbaner), Denmark Train Operating Company.

Description

DSB processes the SQL SERVER, and SFTP server data by running the Informatica ETL tool. During the Migration, DSB’s on-premises SQL Server and Informatica ETL components migrated into Microsoft Azure

components by creating Databricks Notebooks with PySpark Code and SparkSQL. ADF pipelines are built by

creating different logical activities to integrate and Process the Data from the Staging Layer to the Processing layer as per business requirements. Azure DevOps is used to create CI-CD Pipelines for deploying the ADB and ADF.

Tools Used

SQL Server, Informatica, Databricks, Azure Data Factory, ADLS, Azure DevOps, GitHub, JIRA.

Programming Languages

PySpark, SQL, Python

Responsibilities

Analyzing the Information components like Workflows, Mappings, Source Tables, lookups, Expression Transformations, Routers, Target Tables, etc.

Creating Delta Tables in Azure Data Lake by executing DDL’s on Databricks.

Understanding Of Data flowing by using High-level design architecture.

Creation of Databricks Notebooks with PySpark and SparkSQL for ingestion, extraction, transformations, and data loading into the processing layer.

Involved in creating the ADF pipelines for history and incremental loads as per business requirements.

Involved in creating triggers to trigger the ADF pipelines on scheduled time.

Running of DevOps CI-CD Pipelines to deploy the ADB and ADF.

Project #2: Offensive Security Assessment of Live Web Application

Project Name

Web Application Vulnerability Assessment

Customer

Internal Security Initiative (Confidential Web Application)

Description

Conducted a comprehensive security assessment of a live web application using both manual and automated techniques. The objective was to identify and responsibly disclose critical vulnerabilities that could impact the application's confidentiality, integrity, and availability. The assessment focused on DNS-level misconfigurations and missing security headers, aligning with OWASP Top 10 and CVE standards. Recommendations were provided to the development team, and fixes were validated post-remediation.

Tools Used

Burp Suite, Nmap, Manual Security Testing.

Technologies & Standards

OWASP TOP 10, CVE, CVSS

Responsibilities

Performed manual and automated penetration testing on a live production web application.

Identified DNSSEC misconfiguration leading to DNS spoofing and cache poisoning risks (CVE-2008-1447, CVSS 7.5 High)

Detected missing security headers (X-Frame-Options, Content-Security-Policy) resulting in click jacking vulnerabilities (OWASP A07:2021, CVSS 6.5 Medium)

Documented findings with detailed impact analysis and remediation steps.

Conducted responsible disclosure by reporting vulnerabilities to the application owner.

Recommended secure header configurations and validated the implementation of fixes.

Used Burp suite for intercepting and analyzing HTTP traffic and Nmap for network scanning.



Contact this candidate