Garden City, NY
... of Fashion & Technology, Dhaka, Bangladesh Bachelor of Science in Textile Engineering, May 2017 Certifications ● CISCO Cyber Thread Management ● Foundations of Cybersecurity, Google ● Cybersecurity Capstone: Breach Response Case Studies, IBM ● ...
- Jun 04
Manhattan, NY, 10019
... Diango PHP WordPress C#, Routing and switching Server Installation & Configuration System administration Database Administration Cyber Security ACHIEVEMENTS & AWARDS I certified Full stack Web Development (MERN ) provide by Evangadi INC Software ...
- Jun 04
Memphis, TN
... devices/app for identity/access capabilities ●Developed and executed process to support mobile device audits ●Worked with Cyber Security Advisor to resolve mobile access problems, to improve operations and provide exceptional customer service ...
- Jun 03
Fort Worth, TX
... the effectiveness of systems and processes Proven ability to design and implement robust network defense strategies to protect against cyber threats Experienced in identifying and evaluating potential risks, developing mitigation plans to safeguard ...
- Jun 03
Ashburn, VA
... Senior Cybersecurity Project Manager Salient CRGT - Fairfax, Virginia Nov 2019 – Oct 2020 As senior cyber-security expert and crucial contributor to the ISO 27001, NIST 800-171, and Cybersecurity Maturity Model Framework (CMMC) internal and external ...
- Jun 03
Arlington, TX
... • Cyber Threat Identification Analyser — LLMs, OpenAI, LangChain, Vector Database, ChromaDB, Sci-BERT — GitHub Directed development of a task-specific Large Language Model for cyber threat identification from reports. Formed data scraping pipeline, ...
- Jun 03
Dallas, TX, 75208
... is an American multinational investment bank and financial services corporation headquartered in New York City.) I worked with their Cyber Security and Fraud departments to improve their credit/debit card fraud detection using Machine Learning ...
- Jun 03
Orwigsburg, PA, 17961
... Committee for the GeoComputation Conference Series, and served on the US National Academy of Sciences National Research Council Committee on Organizational Modeling from Individuals to Societies, and on an NSF Review Panel for Cyber-Infrastructure. ...
- Jun 03
Columbus, OH
... adept at employing cyber spoofing techniques for identity concealment and leveraging Kali Linux tools for spoofing attacks and monitoring communication using Wireshark; demonstrated expertise in social engineering tools for phishing attacks to ...
- Jun 03
United States
... Employing senior-level knowledge of national strategies, plans, policies, and directives for offensive and/or defensive cyber operations including but not limited to U.S. Department of Defense (DoD) Directive 3600.1, Director of Central Intelligence ...
- Jun 03