Académique Documents
Professionnel Documents
Culture Documents
Well to give you a brief summary about me I come from a small place
in India where computers are still considered to be state of the art and
right now am a masters graduate in computer engineering specializing
in network infrastructure and security. This has been my career growth
in short.
To brief you more about me, I am a Masters degree graduate from the
university of Illinois at Chicago specializing in Network engineering and
information security. I decided to pursue my career as a network
engineer due to the passion I developed for it in my coursework and
my previous jobs. I have been working as a network engineer for my
schools network operations and control team. I was part of the team
that ensures proper functioning of the network infrastructure and
system. My job role was specifically to configure switches and routers
of the network and configure Access control list on them to ensure
security. I also had to perform a lot of server and network configuration
I was also directly responsible for prevention of any network intrusion,
which I implemented using signature based intrusion detection
systems. My other work experiences are mostly related to designing
and configuring LAN networks as per requirements providing IT support
for over 500 computers.
My coursework and professional experience from my previous jobs has
helped me get hands on experience in handling a lot of network
systems .This has made me want to do more in this area and my
passion for it has grown. Right now I am looking for a corporate
environment that has a good network engineering team with a great
work culture and scope for innovations which is why I am very much
interested in a career with Arxium.
If you want me to focus on something particular please feel free to ask
and I will be more than happy to share it with you.
Experience:
I would like to talk to you about my job experience and two of my
projects which I think would be relevant for the job role;
I would be following Task Action Results format as I explain please feel
free to interrupt me with any questions that you might have.
your security policy and allow for few changes based on roles and
privileges of applications. This will ensure transport layer security. Also
I realized from the project that by mitigating the interaction between
the data plane and control plane security can further be enhanced.
Result: I learnt a lot of things through this project on how to ensure
role based authorizations to improve security.
Project : Web Application Security injection and vulnerabilities
mitigation.
Task: The theme of the project was to analyze various threats as
proposed by OWASP guidelines to ensure web application security and
to analyze the various tools available and to find out something novel
out of the research and to propose a solution for it
Action:
I performed a detailed survey on various types of web attacks that an
application is prone to as mentioned by the Open Web Application
Security guidelines. I also used the OWASP wte package to use the
various tools like jbrofuzz web goat , zapproxy webslayer available to
perform security and vulnerability testing against benchmark
applications that my professor suggested. Ran tests on all the tools
and generated reports for the same. I felt all these applications even
though very powerful wouldnt scale well. The usage of web
applications can change rapidly. For example, a web site with a popular
name that is caught by a search engine can suddenly find itself
receiving hundreds of thousands of hits per day rather than just dozens
. In such cases, test suites designed with particular user profiles in
mind may turn out to be inappropriate. So I proposed the solution of
User-session based techniques that can help with this problem by
transparently collecting user interactions and transforming them into
test cases. The techniques capture and store the clients requests in
the form of URLs and name-value pairs, and then apply strategies to
generate test cases. This would make them more dynamic and help it
scale well.
Result: user session data can produce test suites as effective overall
as those produced by existing white-box techniques, but at less
expense.