www.cefintech.ac.in Cyber Security Consultant Delhi : CEFIN TECHNOLOGIES

+ Ask Question / Post resume
Results 1 to 2 of 2
  1. Post Count Number #1
    Site Admin
    Join Date
    April 17th, 2008
    Location
    Europe
    Posts
    11,588

    www.cefintech.ac.in Cyber Security Consultant Delhi : CEFIN TECHNOLOGIES

    cefintech.ac.in
    Position: Cyber Security Consultant
    Qualification: Degree in Computer Science
    Experience: 2 to 3 Years of experience in the same domain.

    Skills Required:


    * Exposure to cyber forensics tools and techniques.
    * Work experience in incident handling teams.
    * Penetration Testing
    * Web Security
    * Network security products
    * Working Knowledge of Forensic Tool Kit (FTK)

    Profile:

    * To conduct technical seminars and workshops.
    * Dealing with Govt. and Corporate offices.
    * Responsibility of creating Incident Response Team (IRS)
    * Managing the web security of the organization
    * Conducting the investigations with various forensics tools
    * Conducting day to day security audits and follow ups
    * The candidate should possess very good communication and presentation skills

    CEFIN TECHNOLOGIES
    Address: K9, Opp Lord’s Inn Hotel, CR Park, Greater Kailash II

    http://www.cefintech.ac.in
    Last edited by mariammal; November 26th, 2011 at 03:52 PM.

  2. Post Count Number #2
    Guest Poster
    Join Date
    August 14th, 2008
    Location
    Your Heart, Delhi
    Posts
    76,213

    DIVYA RANJAN
    E-Mail : divya29nilu AT gmail.com
    CARRIER OBJECTIVE : To establish a place in the IT world of innovation and commercial environment that fully utilizes my IT skills to a full potential and where I will get ample scope for development.
    Professional Synopsis
    - Fresher in Information Security using Microsoft Windows Technologies.
    - Technical proficiency in working with Networking, Ethical Hacking, Internet, Hardware, Software etc.
    Technical Skill Set
    - Languages : C, C++, VB 6.0.
    - Technology : MS Office, Photoshop.
    - Tools : Scanning, Footprinting, Password Cracking, BackTrack.
    - Database : MS Access, ORACLE 9i.
    - Operating System : Windows 2000, Windows XP/Vista/7.
    Academic Credentials
    - Master Of Computer Application, Rajiv Gandhi Technical University, Bhopal, Batch : 2008-11,
    - Bachelor of Computer Application,West Bengal University of Tech., KOLKATA, Year of passing :2008,
    - CLASS 12th : B.I.E.C from K.L.S College, Nawada, Year of Passing: 2003;
    - CLASS 10th : B.S.E.B from GANDHI INTER VIDALIYA,NAWADA, Year of Passing: 2001;
    Academic Project
    - 6th semester project on-“Google Hacking & Wi-Fi Hacking” using Internet and Back Track.
    - 5th semester Project on –“Hospital Management Syatem” using VB 6.0 & MS Access .
    - 3 Month Training from APPIN TECHNOLOGY LAB on “Information Security & Ethical Hacking” completed in 2011 may.
    Project Work
    The goal of penetration testing is to reveal security Flaws of a target network by running attacks against it. Penetration testing includes (1) information gathering, (2) probing the network and (3) attacking the target.
    Firewall Testing
    Testing of the firewall rules varies whether the security policy is correctly implemented by a set of firewall rules and reducing the error. A security policy is a document that sets the basic mandatory rules and principles on information security. Testing of the firewall implementation focuses on the firewall software. The _firewall implementation testing approach evaluates if the firewall rules correspond to the action the firewall performs e.g. if the rule indicates to block a packet but the firewall forwards the packet, we are confronted with a firewall implementation error
    Tool : Hping2, Fire walk, Net cat, Hyena
    Web Application testing
    In recent years, web applications has grown dramatically popular, with organizations converting legacy mainframe and database systems into dynamic web applications using technologies such as PHP, Ajax, JavaScript, JSP, Java, ASP, ASP.NET, etc
    Type common vulnerability SQL injection, Cross site scripting, CSFR. Some other type of vulnerability remote file inclusion local file inclusion upload vulnerability which may lead to comprise of web server.
    Tools : Acunetix Web Vulnerability Scanner 6
    IDS/IPS Testing
    Intrusion detection can be either be software or hardware that identifies any suspect malicious and inappropriate activity. Its main feature to monitor network activity on host network and generate alert when is an intrusion.
    Tools : Wire shark, Cane&Abel, Macof, ARP Flood
    Experience Various Tools
    Acunetix 6.0, Metasploit, Hping2, Wireshark, Nmap (Zenmap), Firewalking, Cane&Abel, Wireshark, GfiLanguard 9, XHydra
    Hobbies
    - Listening Music, watching Movies.
    - Downloading stuffs from internet, Playing Online Games.