www.gslab.com GS Lab Pvt Ltd Pune : Technical lead Test Engineer

+ Ask Question / Post resume
Results 1 to 4 of 4
  1. Post Count Number #1
    Member
    Join Date
    July 5th, 2010
    Location
    tuticorin
    Posts
    81

    www.gslab.com GS Lab Pvt Ltd Pune : Technical lead Test Engineer

    gslab.com
    Position and experience
    : Technical lead Test Engineer with 5 to 8 years of experience
    We are looking senior QA engineer who has significantly contributed in end to end testing of large software application/solutions. The work involves automation testing for the product in Clustering domain. The position requires extensive scripting background and an interest in networking. The position offers an excellent opportunity to work in a fast-paced environment with excellent compensation in Pune.

    Required Profile :
    1. Strong experience in testing domain is required
    2. Working knowledge of databases is required
    3. Strong Python scripting knowledge is essential
    4. Knowledge of any Perl, Shell or TCL is desirable
    5. Familiarity with test and automation frameworks is essential.
    6. Working knowledge of various test tools e.g. ethereal, traffic generators etc, test management is necessary.
    7. Experience in Automating the DB cluster framework is necessary.
    8. Prior experience of working in a test team that performs complete product testing
    9. Bachelor's/Master's degree from a reputed university
    10. Knowledge of clustering and networking domain isdesirable.

    Additional Desired Profile :
    1. Knowledge of networking concepts, TCP/IP, application protocols is desirable.
    2. Ability to work with single line of requirement.
    3. Excellent communication, teamwork, and leadership skills with the ability to deal with very demanding Management and team members

    Emphasis during the Selection Process :
    1. Analytical and problem solving ability
    2. Knowledge of basic concepts of a defect, regression, daily build, test cases, repository,test plans, etc.
    3. Testing skills with knowledge of formal product testing methodology
    4. Long-term career approach
    5. Polite but assertive nature

    Desired Prior Work Experience :
    Product testing experience at companies building software or appliances for enterprise/carrier-grade networks. Knowledge of Silicon Valley culture is highly desirable.

    Contact us :
    Great Software Laboratory Pvt. Ltd
    Amar Arma Genesis
    8th. Floor - B
    Above Food Bazaar
    Baner road, Baner
    Pune 411045, INDIA
    Tel : +91 20 4671 1000
    Tel : +91 20 4671 1110
    Fax : +91 20 4671 1234
    www.gslab.com/careers/careertracks
    Last edited by mariammal; November 25th, 2011 at 12:27 PM.

  2. Post Count Number #2
    Guest Poster
    Join Date
    August 14th, 2008
    Location
    Your Heart, Delhi
    Posts
    76,213

    Re: GS Lab Pvt Ltd Pune : Technical lead Test Engineer

    I m interested to work with ur company.

  3. Post Count Number #3
    On probation
    Join Date
    May 25th, 2011
    Location
    mumbai
    Posts
    1

    .net developer

    Dear Sir/mam,

    Please find attached resume for requirement, i have done MCA.

    Kindly consider my request for any Opportunity.

    Regards
    shweta vaidya

  4. Post Count Number #4
    Guest Poster
    Join Date
    August 14th, 2008
    Location
    Your Heart, Delhi
    Posts
    76,213

    Test Engineer networking(TCP/IP),SNMP,Radius,IPsecVPN,VOIP(SIP),Manual testing.

    NAGESHWAR RAO.V
    Email ID : nagesh.vekkanti AT gmail.com
    ________________________________________
    Professional Experience : About 3.0 years of testing experience on VoIP (SIP), SNMP, Radius, IPSec VPN protocol, Networking (TCP/IP), Network security and IP Security appliances. Currently working for Redshift Networks India Pvt Ltd as a Test Engineer, Hyderabad.
    - Good working experience on VoIP(SIP), SNMP, RADIUS, TCP, IP, DHCP and Port based
    - Working experience on VOIP, SIP, SSL, TLS, RADIUS, IPSec VPN, TCP, UDP, SNMP, IPtables, Radius.
    - Actively Involved in Test case Execution, Test bed Setup, Bug Filing, and Test Scenarios.
    - Working experience as QA engineer on VOIP, IP Telephony, SIP, Network Security, SNMP, and RADIUS.
    - Experience in using traffic generating tools such SIPP, Iperf, PROTOS, Hping2.
    - Working knowledge on IPSec VPN, ISAKAMP, IKE, AH, ESP and VPN Technologies.
    - Working experience on VOIP, SIP, RTP, SSL, TCP, UDP, SNMP, IP Tables, and RADIUS.
    - Good work experience on SNMP (v1, v2, v3) and Advent Net, Mibble Browser, I Reasoning Browsers
    - Based on the Project Requirement document, functional specifications, technical design documents, designed test plans and written test cases for different features.
    - Used standard UNIX services like SSH, FTP, VNCServer, Winscp, Putty, Remote Desktop, Telnet and DNS, DHCP.
    - Good exposure to VOIP PBX, Asterisk, OpenSER, Brekeke Sip Server and Soft clients, eyebeam, X-Lite and SJ-Phone.
    - Experienced in executing various software quality assurance activities for enhancing effectiveness of Network Security Products & Applications.
    - Good Knowledge on Agile Methodology, Scrum, Sprint Cycles, Burndown Charts, Rally Software Management tool.
    - Manual/Black box/Functional Testing of VOIP Firewall.
    SKILLS
    Protocols SNMP, RADIUS, DHCP, TCP, 802.1X, UDP, IPSec, VPN, SIP, VOIP
    Traffic Generating Tools SIPP, Protos and Win Sip.
    Languages / Operating Systems Linux, Windows.
    NMS Advent Net MIB Browser, Ireasoning, Mibble Browser
    VOIP End Points SNOM 320 / 360, Grand stream, Avaya 96XX, and X-Lite.
    Networking tools Firewall, Router, TCP/IP, Ethereal, Tcpdump IPTABLES.
    PBX Asterisk, OpenSER, Brekeke Sip Server.
    EDUCATION
    B.Tech – Bachelor of Technology in Electronics and Communication Engineering, 2009 JNT University.
    Project Experience
    Project Title - 1 : SIP Unified Threat Management (UTM) REDSHIFT Appliance and RSG GUI Testing.
    Project Name SIP Unified Threat Management Appliance
    Client Redshift Networks, Hyd
    Date Jan 2011 to Till Date
    Description :
    This project is aimed at testing the Graphical User interface of Redshift Appliance and Basic call feature Testing. Testing mainly focuses on testing all the screens/tabs/wizards in Redshift Appliance GUI.
    Red shift’s comprehensive UC-Security Appliance provides threat protection, policy enforcement, access control, and privacy measures, along with the ability to simplify the deployment of SIP trunks and mobile workspaces. Certificate provisioning proxy for improved access control; HTTP/TFTP proxy for web services and configuration, and LDAP proxy for directory services, for faster and easier deployment of remote phones; TLS/SRTP proxy for encryption, further ensuring communications privacy; and Network, device, user, domain, and time of day granular policy enforcement.
    Testing focuses on verifying the basic call model and Media path through Redshift Hawk towards Call Manager (CCM4.1/4.1.2/4.2.3/5.0) and Vice-Versa. Redshift Appliance should support call features like Call Forward and Call Transfer, Call Hold, call conference.
    Roles and Responsibilities :
    - Review requirement specifications and technical design documents and Design, write and fulfill test plans and test cases for assessing compliance of delivered products to those requirements.
    - Perform all dimensions of testing, including Sanity, functional, System-level, Stress/Load and Regression testing. Extensively involved in configuring and testing VoIP domain based policies. Developed test cases in Test Case Management Tool (QaTrac) for DOS attacks.
    - Involved in configuring and testing features against DOS attacks on UC-Security device. Involved in performing basic SIP endpoint authentication with RADIUS server.
    - Performed complete testing of basic and advanced functionality of SIP Phones and SIP PBX servers from different vendors with UC-Security device in place.
    - Participate in the Beta Teams for supporting Beta customers. Report and maintain software defects in the defect management system (JIRA). Involved in testing Basic SIP supplementary features such as Call Hold, Call Transfer, Call Forward, and Call Waiting.
    - Developed test plan test procedures and test cases for GUI testing/Call feature Testing.
    - Configured the tested in DMZ (Demilitarize Zone) Using Virtual IP on Redshift Appliance.
    - Configured External and Internal Firewalls and Metros Proxy
    Project – 2 : SNMP agent and RADIUS Client Support.
    Project Name SNMP agent and Radius Client Support
    Client Redshift Networks, Hyd
    Date Sep 2010 to Dec 2010
    The Redshift Hawk is a multi-function, multi-threat security platform that connects and protects remote and branch offices. It combines the functionality of a multi-threat security gateway, VoIP gateway, IP PBX, router and switch into a single, integrated device, reducing costs and simplifying management challenges.
    This is the MIB module REDSHIFT-REDSHIFT-MIB from Redshift, Inc... This OID tree represents the compiled SNMP MIB module REDSHIFT-REDSHIFT-MIB and includes only high-level compiled information. For more detail (mib object descriptions, Unit Types, Textual Conventions, Macro-definitions, etc.), please download the raw SNMP ASN.1 mib test file by clicking on the ZIP icon above. To query a live agent with SNMP for objects in module REDSHIFT-REDSHIFT-MIB, use OidView Network Management Tools or SNMP MIB Browser. To capture and analyze snmp traps from a live agent with objects loaded from module REDSHIFT-REDSHIFT-MIB, use OidView Trap Manager SNMP Fault Management
    Remote Authentication and Dial-in User Service (RADIUS) servers provide authentication, authorization, and accounting functions. Redshift Hawk units use the authentication function of the RADIUS server. Your RADIUS server listens on either port 1812 or port 1645 for authentication requests. You must configure it to accept the Redshift Hawk unit as a client. The RADIUS server user database can be any combination of user names and passwords defined in a configuration file an SQL database user account names and passwords configured on the computer where the RADIUS server is installed The RADIUS server uses a “shared secret” key to encrypt information passed between it and clients such as the Redshift Hawk unit.
    Responsibilities :
    - Created SNMP test processes and UTM test cases
    - Created UTM test bed environment for Snmp Agent Testing
    - Tracked, debugged, logged, and diagnosed various SNMP Traps and Operations
    - Configured and deployed SNMP (V1,V2,V3) auth, and other authentication backend systems
    - Dwelt the execution on SNMP, RADIUS, and Identity Based Policies.
    - Worked with customers on-site to troubleshoot connection issues and network troubleshooting and debugging.
    Project – 3 : Media Level High Availability Testing on Redshift Gateway
    Project Name High Availability Testing on Redshift gateway
    Client Redshift Networks, Hyd
    Date May 2010 to Aug 2010
    Redshift Appliance is sitting in NAT mode so we are single point of failure of SIP service. If our box is down, crashed , or link is removed from the firewall LAN switch, rebooting the box then whole SIP service will be down even though there is no issue in the VOIP server. We provide High Availability on Media level to the Remote employees so that there should not be any disconnection of calls and media when our box down due to any reason like process core dump, link removed from firewall LAN switch or rebooting the box.
    We have two Redshift Appliance sharing the same DMZ IP and one box will be active at a time which will respond to the ARP, ICMP request and any other traffic. Other box will be operationally inactive so that it will not respond for the ARP request (because both have the same IP address). Redshift Appliance keep communication between two box so that they can exchange the active call information , originator IP, port, RTP specific information and if one box is down the other box takes care of the active calls. But the End points which doesn’t have active call have to get registered again after register timeout happens as per SIP RFC. We don’t support High availability for Signaling level of VOIP.
    Roles and Responsibilities :
    - Participated in the designing of the test plan and test cases
    - Transmit the information for active call how many calls are active and what are all their IP address , TCP port and RTP ports, which is 4 tuple (source ip :port and destination IP:port).
    - Implementation of GARP to handle the same IP address of our box in the DMZ and firewall should have the MAC address mapping their arp table as the active box
    - Election procedure and testing the state machine how do we decide who will become active when Redshift Appliance comes up or comes down.
    Project-4 : SIP Protocol and Supplementary Features Testing FORTIGATE VOICE 80C Gateway.
    Project Name Unified Communication Security on 80C Gateway
    Company Cybage Software India Pvt Ltd
    Client Fortinet Inc
    Date Jan 2010 to Apr 2010
    The FortiGate Voice-80C is a multi-function, multi-threat security platform that connects and protects remote and branch offices. It combines the functionality of a multi-threat security gateway, VoIP gateway, IP PBX, router and switch into a single, integrated device. The FortiGate Voice-80C meets the needs of small, medium, or branch offices to do more without spending more. It delivers integrated data security, VoIP support, and a full-featured PBX, all managed by a single console. By integrating all three technologies, the FortiGate Voice-80C lowers the cost and time required to Configure and manages your network security, VoIP security, and PBX functionality.
    Session Initiation Protocol (SIP) is designed as an application layer protocol that is responsible for the initiation, modification and termination of interactive multimedia sessions across packet networks. The interaction between the devices is permitted through signaling messages. These messages can fulfill many purposes including registering a user with the system, inviting users to join interactive sessions, negotiating the terms and conditions of the system and terminating sessions
    The scope of the project was to test the features of the SIP IP Communications for the Originating and Terminating endpoints, according to the RFC 3261 specifications, for a successful call establishment with supplementary call features, such as
    - End Point Registration
    - Basic Call, Call Forward Busy, No Answer, Unconditional
    - Call Blocking
    - Call Hold, Call Transfer.
    Our team was involved in reading the product implementation document, testing all the messages and their header parameters in creating a successful multimedia communication (SDP) and generating the test report. We had to input values and the addresses that were with specification mentioned in RFC 3261, in the headers parameters and checked whether a successful communication was being established or not.
    Responsibilities
    - Involved in the analysis of requirement use cases and in preparation of the test plan.
    - Study of RFC related to VOIP (RFC 3261) to review the adequacy of test cases Executing test cases and raising the bug and reporting the bug. Extensively Involved in SIP Registration Test plan, test case Execution, Defect filing and test bed setup.
    - SIP Call Feature testing on 80C Gateway such as Call Hold, Call Forward, Call Transfer, Call Pickup, call Conference. Test case design, develop and execution for security level. Designing and implementation of test bed. Performing Functional, Regression and Sanity testing. Bug tracking, logging and reproducing the bugs.
    Project – 5 : IPSec VPN Testing on FortiGate Firewall and Media encryption over VPN Channel.
    Project Name Unified Communication Security on 80C Gateway
    Company Cybage Software India Pvt Ltd
    Client FortiNet Inc
    Date Jan 2009 to Dec 2009
    This project is aimed at testing Remote User Enablement Feature on FortiNet Gateway. Remote Users will be connected from home to office over VPN Channel, to access PBX server located in Corporate LAN. End users experience the same IP telephone features as if they were using the telephone in the office .Remote VPN is a flexible suite of fully managed remote access solutions that can help reduce the complexities of implementing and maintaining a remote access solution. All VPN services are fully integrated with our remote access client to give end users a simple user interface.
    ForiNet Gateway support VPN into two primary types. Site-to-Site VPNs virtually extend the corporate LAN to a company's satellite offices, and this connectivity is established between VPN gateways at each participating location. Remote Access VPNs, on the other hand, are used to provide a remote user, such as a field sales person, access to the internal corporate network from various remote locations. The two primary components that comprise this user-to-LAN connection are VPN client software that operates on the remote user's machine and a VPN gateway that is the entry point into the company's internal network from the Internet. We will look at layer-3 IPSec VPNs that require a thick VPN client, as opposed to SSL-based VPNs that require only a browser on the client machine to establish connectivity to internal resources like file and mail servers. IPSec is based on symmetric-key encryption and consists of the following primary security components :
    - Basic Tunnel Establishment with various Phase1 and Phase 2 parameters
    - Remote Site VPN
    - Site to Site VPN
    - VPN with NAT, NAT Traversal
    - IPSec authentication methods
    - IPSec VPN with External authentication support (RADIUS, LDAP)
    Responsibilities :
    - Created GUI test cases for FortiNet gateway and IPSec Feature
    - Testcase writeup for IPSec Phase1 and Phase 2 configuration
    - Involved in configuring IPSec features NAT-T, PMTUD, PFS, and Dead Peer Detection.
    - Created UTM test bed environment for IPSec VPN
    - Tracked, debugged, logged, and diagnosed various IPSec tunnel issues
    - Configured and deployed IPSec with various Phase1 , Phase II parameters
    - Worked with customers on-site to troubleshoot connection issues and network troubleshooting and debugging.