Skills

  • Cryptography:
  •  DES, AES, RSA
  • Network Security:
  •  IDS/IPS Implementations
  •  NSM and Proxy Server Configurations
  •  Routing and Switching Protocols
  •  SIEM and SOAR Management
  •  Threat Modeling
  •  Cloud-based Security Monitoring
  • Web Application Security:
  •  Penetration Testing
  •  Zed Attack Proxy
  •  OWASP Top 10 Vulnerabilities
  • Security Operations:
  •  Log Analysis with Zeek
  •  Incident Response Frameworks (NIST Cybersecurity)
  •  Compliance Knowledge - PCI/SOX, HIPAA, GDPR
  •  Physical Security Monitoring and Access Control Systems
  •  Enterprise Security Solutions (Cameras, Access Control)
  • Offensive Security:
  •  OSINT
  •  Metadata Analysis
  •  Reverse Engineering (x86 Assembly)
  • Automation and Virtualization:
  •  Docker
  •  Vagrant
  •  Ansible
  •  VMware Workstation
  • Security Awareness and Training:
  •  KnowBe4
  •  Demisto
  • Networking:
  •  Arista EOS
  •  Cisco IOS
  • Databases:
  •  MySQL
  •  Microsoft SQL Server
  •  Cloud Databases for Integrated Security Systems
  • Hardware Security:
  •  Physical Security Solutions (Cameras, Access Control, Sensors)
  •  Hybrid-cloud Managed Devices and System Deployment

Programming Languages:

  • ASSEMBLY x86
  • BASH
  • BATCH
  • C++
  • JAVA
  • JAVASCRIPT
  • PHP
  • POWERSHELL
  • PYTHON
  • Q#
  • SQL

Development Tools and Environments:

  • ANDROID STUDIO
  • GIT
  • JUPYTER
  • MICROSOFT OFFICE
  • SQL
  • VISUAL STUDIO
  • ACTIVE DIRECTORY

Languages:

  • ENGLISH
  • HINDI
  • RUSSIAN