The IT Guy!
A Network Security Analyst with a difference.
Started career as a Developer and through the process of self learning and career enhancement reached Security Analyst.
Network Security: Knowledge of Network Auditing, Penetration Testing, Network Vulnerability Assessment and Network Architecture Review using commercial and open source tools such as Nessus, SolarWinds, and Accunetix
Virtualization: Experienced with Virtualization tools such as Hyper-V, VMWare Collection and Virtual Box
Server: Good experience with MS Server 2003,2008, MS Exchange 2003,2010, Red Hat and Active Directory over an enterprise environment
Networking & VoIP:Over 3 years of System, Network Administration and maintenance experience troubleshooting in a NOC in a fast paced IT environment & Experience in VoIP implementation
- English - Excellent
- Hindi - native
- L33t - native
Driving, travelling Sports
I have driver's license for small cars and a diploma in free jumping from tropical trees.
My favorite color is random.
My skills are primarly in Server and Security areas, powered by a native talent in handling heavy military machinery.
^ And Many many more.
A summary would be:
Over 3 years of System, Network Administration and maintenance experience troubleshooting in a fast paced IT environment
4 years experience in providing support to Windows and Linux platforms and 4 years experience with Virtualization, have good experience in working in virtual environments
Experienced in supervising and coordinating up to a team of 8 IT Technicians and LAN Administrators
Knowledge of Network Auditing, Penetration Testing, Network Vulnerability Assessment and Network Architecture Review using commercial and open source tools such as Nessus, SolarWinds, and Accunetix
Yellow Wood Networks
Responsable for Server Hardware and Software Installs, System Setup, Perform security Audits on Clients on behalf of the company, Build and provide support to VoIP based solutions to clients and Network T2/3 Support.
Supervised and coordinated a team of 8 IT Technicians and LAN Administrators for maintenance, troubleshooting and management of existing servers, printers and other IT Equipment.
Installed firewalls and Intrusion Detection Systems after taking over as Head of Department
Server upgrades were performed to change Server 2003 Standard to Server 2008 Enterprise version, Exchange 2003 was upgraded to Exchange 2010.
Initiated virtualization of Servers to cut costs of purchasing separate expensive equipment
Network Monitoring and Management tool used to setup Help Desk Support and Ticketing resolution, including supporting the Business 7x24x365 and on-call support as needed Remote Troubleshooting and Management
Installed and setup VoIP Routers on the Nortel PBX as an extension to cut costs on International Calling.
Learn all your life, said a dude.
Post Grad: George Brown College, Toronto
Post Graduate, Wireless Networking (VoIP)
- Asterisk VoIP Specilization
- Cisco Networking
- Angry Birds - High Score Secrets
Grad:Kuvempu Vishwavidyanilaya, India
Bachelor of Science in IT
Security: EC Council
- C|EH - Certified Ethical Hacker
- E|CSA - Certified Security Analyst
An eternal student.
Getting to Know yourself before the others do
With multi-tier network archtectures, web services, custom applications, and heterogeneous server platform environments, keeping data and information assets secure is more difficult than ever. Coupled with this added complexity is the fact that criminal organizations have organized their hacking efforts; it is no longer just “script kiddies” trying to break into your network. Although there are many ways to secure systems and applications, the only way to truly know how secure you are is to test yourself. By performing penetration tests against your environment, you can actually replicate the types of actions that a malicious attacker would take, giving you a more accurate representation of your security posture at any given time. Although most penetration testing methods have traditionally been somewhat ad-hoc, that has changed in the last several years. Robust, repeatable testing methodologies now exist, and high quality commercial tools can be implemented to ensure that both testing parameters and results are high-quality and trustworthy
Hi! I hacked your computer
Imagine you receive a PDF attachment from a friend or a colleague, you open it and you get a PDF attachment error because the file maybe damaged or not created properly. Your first thought is that the source may not be good, you run it through antivirus and it shows the file is clean; this gives you the feeling of safety. You now click ok to continue with your tasks to ask your IT for help for to try something else. You didn’t realize that you just got owned!
To get in touch with me, .
Telephone: +1 647 717 0241
Email: talk2me [at] cyberphunkz.com
Address: Calgary, AB, Canada
For a quick message you can use the form below.
BEWARE: My form has been known to capture souls
My association with toastmasters began in Oct'07
Thinking of what else to write here
Please visit the website of my home club, South Delhi Toastmasters Club