Profile

A Network Security Analyst with a difference.

Started career as a Developer and through the process of self learning and career enhancement reached Security Analyst.

Interests

Network Security: Knowledge of Network Auditing, Penetration Testing, Network Vulnerability Assessment and Network Architecture Review using commercial and open source tools such as Nessus, SolarWinds, and Accunetix
Virtualization: Experienced with Virtualization tools such as Hyper-V, VMWare Collection and Virtual Box
Server: Good experience with MS Server 2003,2008, MS Exchange 2003,2010, Red Hat and Active Directory over an enterprise environment
Networking & VoIP:Over 3 years of System, Network Administration and maintenance experience troubleshooting in a NOC in a fast paced IT environment & Experience in VoIP implementation

Spoken Languages

  • English - Excellent
  • Hindi - native
  • L33t - native

Hobbies

Driving, travelling Sports

 

I have driver's license for small cars and a diploma in free jumping from tropical trees.

My favorite color is random.

Technical Skills

My skills are primarly in Server and Security areas, powered by a native talent in handling heavy military machinery.
 
Network Security
Server Admin
Virtualization
Photoshop
Facebook at the office
Black Metal drumming

^ And Many many more.

 

A summary would be:
Over 3 years of System, Network Administration and maintenance experience troubleshooting in a fast paced IT environment

4 years experience in providing support to Windows and Linux platforms and 4 years experience with Virtualization, have good experience in working in virtual environments

Experienced in supervising and coordinating up to a team of 8 IT Technicians and LAN Administrators

Knowledge of Network Auditing, Penetration Testing, Network Vulnerability Assessment and Network Architecture Review using commercial and open source tools such as Nessus, SolarWinds, and Accunetix

BackTrack 5
Metaploit
Dreamweaver 5

Work Experience

Yellow Wood Networks

2012-Present
Network Administrator
Responsable for Server Hardware and Software Installs, System Setup, Perform security Audits on Clients on behalf of the company, Build and provide support to VoIP based solutions to clients and Network T2/3 Support.

C.C.I.C.

2009-2010
Head Of Information Technology Department

Supervised and coordinated a team of 8 IT Technicians and LAN Administrators for maintenance, troubleshooting and management of existing servers, printers and other IT Equipment.

Installed firewalls and Intrusion Detection Systems after taking over as Head of Department

Server upgrades were performed to change Server 2003 Standard to Server 2008 Enterprise version, Exchange 2003 was upgraded to Exchange 2010.

Initiated virtualization of Servers to cut costs of purchasing separate expensive equipment

Network Monitoring and Management tool used to setup Help Desk Support and Ticketing resolution, including supporting the Business 7x24x365 and on-call support as needed Remote Troubleshooting and Management

Installed and setup VoIP Routers on the Nortel PBX as an extension to cut costs on International Calling.

Education

Learn all your life, said a dude.

Post Grad: George Brown College, Toronto
2010-2011

Post Graduate, Wireless Networking (VoIP)

Grad:Kuvempu Vishwavidyanilaya, India
2005-2008

Bachelor of Science in IT

Security: EC Council
2009

Security Certifications
An eternal student.

Papers

Getting to Know yourself before the others do

With multi-tier network archtectures, web services, custom applications, and heterogeneous server platform environments, keeping data and information assets secure is more difficult than ever. Coupled with this added complexity is the fact that criminal organizations have organized their hacking efforts; it is no longer just “script kiddies” trying to break into your network. Although there are many ways to secure systems and applications, the only way to truly know how secure you are is to test yourself. By performing penetration tests against your environment, you can actually replicate the types of actions that a malicious attacker would take, giving you a more accurate representation of your security posture at any given time. Although most penetration testing methods have traditionally been somewhat ad-hoc, that has changed in the last several years. Robust, repeatable testing methodologies now exist, and high quality commercial tools can be implemented to ensure that both testing parameters and results are high-quality and trustworthy


Hi! I hacked your computer

Imagine you receive a PDF attachment from a friend or a colleague, you open it and you get a PDF attachment error because the file maybe damaged or not created properly. Your first thought is that the source may not be good, you run it through antivirus and it shows the file is clean; this gives you the feeling of safety. You now click ok to continue with your tasks to ask your IT for help for to try something else. You didn’t realize that you just got owned!


Contact

To get in touch with me, .


Telephone: +1 647 717 0241
Email: talk2me [at] cyberphunkz.com
Address: Calgary, AB, Canada



 

For a quick message you can use the form below.
BEWARE: My form has been known to capture souls



Toastmasters International

My association with toastmasters began in Oct'07

Thinking of what else to write here



SDTM Rocks!

 

Awards

Communicator Series

CC

ACB

ACS

Leadership Series

CL

ALB

Mentions

Thing 1

Thing 2

Please visit the website of my home club, South Delhi Toastmasters Club