February 8th, 2011, 07:09 PM
Post Count Number #1
www.cefintech.ac.in Cyber Security Consultant Delhi : CEFIN TECHNOLOGIES
cefintech.ac.in
Position: Cyber Security Consultant
Qualification: Degree in Computer Science
Experience: 2 to 3 Years of experience in the same domain.
Skills Required:
* Exposure to cyber forensics tools and techniques.
* Work experience in incident handling teams.
* Penetration Testing
* Web Security
* Network security products
* Working Knowledge of Forensic Tool Kit (FTK)
Profile:
* To conduct technical seminars and workshops.
* Dealing with Govt. and Corporate offices.
* Responsibility of creating Incident Response Team (IRS)
* Managing the web security of the organization
* Conducting the investigations with various forensics tools
* Conducting day to day security audits and follow ups
* The candidate should possess very good communication and presentation skills
CEFIN TECHNOLOGIES
Address: K9, Opp Lord’s Inn Hotel, CR Park, Greater Kailash II
http://www.cefintech.ac.in
Last edited by mariammal; November 26th, 2011 at 03:52 PM.
July 29th, 2011, 07:06 PM
Post Count Number #2
DIVYA RANJAN
E-Mail : divya29nilu AT gmail.com
CARRIER OBJECTIVE : To establish a place in the IT world of innovation and commercial environment that fully utilizes my IT skills to a full potential and where I will get ample scope for development.
Professional Synopsis
- Fresher in Information Security using Microsoft Windows Technologies.
- Technical proficiency in working with Networking, Ethical Hacking, Internet, Hardware, Software etc.
Technical Skill Set
- Languages : C, C++, VB 6.0.
- Technology : MS Office, Photoshop.
- Tools : Scanning, Footprinting, Password Cracking, BackTrack.
- Database : MS Access, ORACLE 9i.
- Operating System : Windows 2000, Windows XP/Vista/7.
Academic Credentials
- Master Of Computer Application, Rajiv Gandhi Technical University, Bhopal, Batch : 2008-11,
- Bachelor of Computer Application,West Bengal University of Tech., KOLKATA, Year of passing :2008,
- CLASS 12th : B.I.E.C from K.L.S College, Nawada, Year of Passing: 2003;
- CLASS 10th : B.S.E.B from GANDHI INTER VIDALIYA,NAWADA, Year of Passing: 2001;
Academic Project
- 6th semester project on-“Google Hacking & Wi-Fi Hacking” using Internet and Back Track.
- 5th semester Project on –“Hospital Management Syatem” using VB 6.0 & MS Access .
- 3 Month Training from APPIN TECHNOLOGY LAB on “Information Security & Ethical Hacking” completed in 2011 may.
Project Work
The goal of penetration testing is to reveal security Flaws of a target network by running attacks against it. Penetration testing includes (1) information gathering, (2) probing the network and (3) attacking the target.
Firewall Testing
Testing of the firewall rules varies whether the security policy is correctly implemented by a set of firewall rules and reducing the error. A security policy is a document that sets the basic mandatory rules and principles on information security. Testing of the firewall implementation focuses on the firewall software. The _firewall implementation testing approach evaluates if the firewall rules correspond to the action the firewall performs e.g. if the rule indicates to block a packet but the firewall forwards the packet, we are confronted with a firewall implementation error
Tool : Hping2, Fire walk, Net cat, Hyena
Web Application testing
In recent years, web applications has grown dramatically popular, with organizations converting legacy mainframe and database systems into dynamic web applications using technologies such as PHP, Ajax, JavaScript, JSP, Java, ASP, ASP.NET, etc
Type common vulnerability SQL injection, Cross site scripting, CSFR. Some other type of vulnerability remote file inclusion local file inclusion upload vulnerability which may lead to comprise of web server.
Tools : Acunetix Web Vulnerability Scanner 6
IDS/IPS Testing
Intrusion detection can be either be software or hardware that identifies any suspect malicious and inappropriate activity. Its main feature to monitor network activity on host network and generate alert when is an intrusion.
Tools : Wire shark, Cane&Abel, Macof, ARP Flood
Experience Various Tools
Acunetix 6.0, Metasploit, Hping2, Wireshark, Nmap (Zenmap), Firewalking, Cane&Abel, Wireshark, GfiLanguard 9, XHydra
Hobbies
- Listening Music, watching Movies.
- Downloading stuffs from internet, Playing Online Games.