Professional Documents
Culture Documents
Security certifications
CEH: Certified Ethical Hacker
CHFI: Computer Hacking Forensic Investigator
ECSA: Eccouncil certified security analyst
IBM Rational AppScan Standard Edit
Certified ISO 27001:2005,27002 Lead Auditor.
Got Trained from ISCA on system Auditing (CISA).
System
Research Paper and Achievements and awards
Implemented and actively participated in exploring new services
offering like mobile security, cloud, Big data Security.
Effect of Mobile Microwaves- Inter National Level - Isamap2K4I.I.T ,Kharagpur
Wirelesslan&its security process- State Level ,TechnoxtremeYavatmal
Mobile Communications- National Level - Computest-SpandanNagpur
Assess all risk and evaluate all impact for technology changes in
processes and maintain knowledge of all security systems and
deploy all required infrastructure.
Recommend Best Practices for securing the Application.
Communicating and coordinating day-to-day project activities within
the project team and assure that priorities are developed and
known.
Provide assistance to IT staff and provide all security specifications
for all vendor products and evaluate all requests for security
architecture.
Gather data from different sources to be entered to the remediation tool
May
Jan
Aug
Involved all the projects at all stages to help in the security related
issues and solutions.
Involved in the network security and also web application security
scanning and Analysis in the R&D IT department in the client side.
Involved in understanding the business requirements and
applications flow and also support in RFP and POCs.
Involved in preparation of Security Project Plan and cost and man
power Estimations.
Performed Web Application Security /Penetration Testing in
accordance with OWASP standards and WADS guidelines, using
manual techniques and open source tools.
Recommend Best Practices for securing the Applications and also
servers to be compline with client security base line.