IT Security Coordinator

India

none experience

Birthday:

Nationality:
Indian

21789901

University education

Timeframe
Degree / faculty / university
Study areas

2015-082017-08

completed

Master of Engineering
IT Security (post-graduate)

, India

1. PROJECT [M.TECH] : Using Microsoft SDL develop a threat Model For E-BANKING and analyzing threats using STRIDE
approach.

2. PROJECT [M.TECH -MAJOR PROJECT] : Enhancing Location Privacy Protection Using Obfuscation based Approaches
Description :- Information regarding physical locations of individuals is rapidly becoming easily available for processing by online and mobile Location-Based Services (LBSs).The widely accepted online third party location based services and mobile communication devices for location technologies are fostering the development of a new wave of applications offers various social or informational purposesin now a days. As an effect of such innovative services, however, privacy concerns are increasing, and we needs more sophisticated solutions for providing users with different and manageable levelsof privacy. Also the fact that, Since the beginning of the smart phone era, the number of mobile appsthat use location data has increased rapidly. In this work, we focus an intuitive methodology called "location obfuscation" to express users privacy preferences on location information in a straightforward and instinctive way.

3. PROJECT [B.E]: Information sharing and security in Dynamic coalation
Domain : JAVA
Role : TEAM LEADER
Description :- The main objective of my project is to share the information faster than traditional system, on a sudden unexpected situations like earthquake, terrorist attack.

4. PAPER PUBLISHED :
Paper Title :

5. ACADEMIC SEMINAR
TOPIC:- Mimicry Attacks On Host - Based IDS

  • Document_Study_011.jpg

2010-062014-04

completed

Bachelor of Engineering
Computer Science

, India

Computer Forensics , computer Hacking, Cyber Security , Location Privacy.
 Operating Systems (Windows, Ubuntu, Linux)
 Tools (Wireshark, Cisco Packet Tracer, Microsoft SDL Threat Modeling tool, Encase Forensic imager, Splunk,
Nmap, FTK,Eclipse,Android Studio,Basics in Hadoop,Cloudera Manager, Installation of CDH5,Metasploit)
 Good knowledge on software development lifecycle and software test life cycle
 Knowledge on various SDLC models,Database fundamentals, writing and executing SQL statements
 Knowledge on SQL server Database Management Systems

  • Document_Study_021.jpg

Training and development

Timeframe
Degree / institute
Content

Further training

2017-12-18Till now

Computer Hacking & Forensic Imvestigator V9

, India

CHFI includes detailed methodological approach to computer forensic and evidence analysis. It provides the necessary skillset
for identification of intruder’s footprints and gathering necessary evidence for its prosecution. All major tools and theories used by cyber forensic industry are covered in the curriculum. The certification can fortify the applied knowledge level of law enforcement personnel, system administrators, security officers, defense and military personnel, legal professionals,
bankers, computer and network security professionals, and anyone who is concerned
about the integrity of the network and digital investigations.

Primary / secondary school education

2008-07-012010-03-14

completed

Higher Secondary Education ( Plus Two)

, India

  • Document_Education_011.jpg

Primary / secondary school education

1998-062008-03

completed

10 th

, India

  • Document_Education_021.jpg

Publications

Date
Type of publication / publisher
Title / content

Author / creator

2017-03-15

Other publication



  • Document_Publication_011.pdf

Language ability

Language
Level
Exam / certificate
English
Fluent (C1)

German
Basic knowledge (A1)

Malayalam
Mother tongue

Tamil
Basic knowledge (A1)

Other skills

Key professional skills
Driver licenses
Interests, hobbies, personal

Technologies/Languages (C, C++,javaScript,Python)

Operating Systems (Windows, Ubuntu, Linux)

Tools (Wireshark, Cisco Packet Tracer, Microsoft SDL Threat Modeling tool, Encase Forensic imager, Splunk,
Nmap, FTK,Eclipse,Android Studio,Basics in Hadoop,Cloudera Manager, Installation of CDH5,Metasploit) & Various other hacking and Forensic tools.

  • Motorcycle
  • Automobile

Start recruiting