Figura professionale: System Administrator Cum Cyber Security

Nome Cognome: P. M.Età: 31
Cellulare/Telefono: Riservato!E-mail: Riservato!
CV Allegato: Riservato!Categoria CV: Network / Security Engineer
Sede preferita: Europe

Accesso Full al database con 29.998 CV a partire da € 5,00    ABBONATI SUBITO!



Sommario

Syste**** Ad****inistrator Cu**** Cyber Security

Esperienze

Personal statement

A highly experienced and competent IT Security Engineer with 3 years experience in a variety of office
based environments. Continuous learner with a passion for innovation in security risk management to
drive bottom-line business contributions optimizes security investments, avoid losses from security
incidents, enhance business decision-making, and reduce corporate liability. Exceptional levels of integrity,
work ethic, and drive to achieve. 

Core skills
 Expertise and knowledge of databases, networks, hardware, firewalls and encryption. In-depth
knowledge in Web application, database, scripting and reverse engineering.
 OWASP top attacks with their detection and preventions techniques.Different types of Security
Audit, Penetration testing, Vulnerability Assessments and Techniques, Countermeasures for social
engineering to identify the risk.
 Well in all security tools and methodology as per standards and complete knowledge of
Networking, Firewalls, IDS, Vulnerability Analysis, and Malware Analysis.
 Fully experienced in providing and maintaining IT Infrastructure across large networks. Complete Inhouse support to the end user and the project team.
 Comprehensive knowledge in the Windows, Linux, and Business tools environment. Monitoring of
SLA and participation in incident and problem management.

Technical Certifications
 Certified Ethical Hacker Certification (CEH V 10 ) –EC Council
 CCNA/MCSA Certification – Cisco and Microsoft
 Kali Linux And Web App Penetration Testing – Cybrary
 Malware Analysis and Reverse Engineering – Cybrary

Employment history
Cyber Security Intern – Codec Networks (Feb-2018 – March-2019)
Duties:
 Secure the financial and personal information, and block intruders from accessing and divulging
proprietary data.
 Constant monitoring and analysis of individual vulnerable to verify the harmfulness and infiltration
of their computer systems.
 Protect websites and networks from cyber threats such as malware, denial-of-service attacks, hacks
and viruses.
 Risk assessment and internal auditing based on cyber security standards and evaluate risk in
technology delivered areas.
 Data Security investigations surrounding access, vulnerability, network security, operating system,
database and 3rd party application. 

IT Support Engineer – Thomas Cook India Ltd (Oct-2016 – Feb-2018)
Working in a busy office environment, leading the technical support team of over 250 employees
Duties
 Being first point of call for all IT issues and Best practices and knowledge in ITSM/ITIL.
 Logging faults and managing response times and Asset Management.
 Diagnosing and resolving problems efficiently (Both H/W and S/W )
 Maintaining the integral security of business networks and Application Environment.
 Ensuring all hardware operates at its optimum level with latest updates and patches.
 Distributing relevant jobs to junior staff members and providing support when required
 Daily Maintenance in Printer, Scanner, Xerox Machine and Networking components.

Customer Support – Avantha Groups (April 2015 – November 2015)
Duties
 Manning the Help desk and providing instant solutions to the Customers
 Running diagnostic checks and servicing essential Electronics Equipment’s

Skills in Tools
Operating System : Linux (Kali, Ubuntu, Santoku, Android), Windows (7, 10, Server 2012)
Scripting Language : Java Script, HTML, PHP, Python, jQuery, SQL, and Ruby
VAPT Tools : Nessus, Qualys, Burp Suite Pro, OWASP Zap Proxy, Metasploit, NMAP,
 Nikto, Google Dorks, Enumeration Tools, IDA Pro, Wireshark, Ettercap,Hydra
 NetCraft, SET, LOIC, Aircrack-ng, Wifite, Kfsensors, SQLMap, and Virus Total.
Virtualization Tool : VM Ware, Virtual Box, Geny Motion Emulator
Analysis Technique : OWASS Top 10, White Hat Hacker concepts
Other Tools : Remote Tools, Incident Management Tools (ITIL), Switches/Routers/Firewall
 VoIP, McAfee Endpoint Security, SSL VPN, WSUS Patch Updates, FTP

Education
P.S.V College of Engineering and Technology (2010 – 2014)
B.Tech Information Technology – 70 %
T.V.H.S School (2009 – 2010)
Higher Secondary School (12th ) – 53.5%
Govt. High School (2007-2008)
Secondary School (10th ) – 81.6 %

210 total views, 1 today