Anda di halaman 1dari 3

Shakira Muhammed Kunhi

Mobile: +965-69692267, Kuwait


Email: shahaza313@gmail.com
Career Objective:

Professional, detail-oriented System Security Analyst motivated to continuously learn


and grow within the Security field of technology.
Summary of Skills:

 Experienced in identifying potential threats and ensuring security of network


systems
 Strong knowledge of system, network security, log analysis, and intrusion
detection technologies
 Expert in taking quick action on cyber threat intelligence
 Superior knowledge of TCP/IP, firewalls, routers, and network protocols and
technologies
 Excellent communication, organization, and troubleshooting skills
 Expert in project management, risk assessment, and security audits

Education

 Master of Engineering in Computer Science and Information security, LBS COLLEGE OF


ENGINEERING, KASARAGOD, KERALA, INDIA(CGPA: 9.0) Year: 2015-2017
 Bachelor of Engineering in Computer Science and engineering, COLLEGE OF
ENGINEERING TRIKARIPUR, INDIA (Percentage: 81.09) Year: 2005-2009

Professional Certification
 EC-COUNCIL Certified Ethical Hacker (CEHv9) 2017
 EC-COUNCIL Computer Hacking Forensic Investigator (CHFI v9) 2017
 Diploma in Java from NIIT Bangalore , 2010
Academic Research Work
Title of the project: Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud
Using seed Block algorithm
Language used : Java
Description : With the advent of cloud computing, data owners are motivated to
outsource their complex data management systems from local sites to the commercial public
cloud for great flexibility and economic savings. Considering the large number of data users and
documents in the cloud, it is necessary to allow multiple keywords in the search request and
return documents in the order of their relevance to these keywords. The Data owner initially
segments the files. Applying seed block algorithm differently in each fragments, then encrypts it
using AES algorithm. Storing these file fragments in different buckets in cloud. During searching
users enters a keyword the server will give the corresponding matching files. Thus the proposed
system offers more security, integrity and data recovery.

Technical Skills

 Framework: Metasploit.
 Methodologies : OWASP Top 10
 Security Tools: Nmap,Zenmap,Nmap-Scripting
Engine,Nessus,Burpsuit,Wireshark,shodan,medusa,SqLMap,BurpSuite,Hydra,W
afw00f.
 Database: SQL fundamentals (MYSQL, MS Sql, PostgreSQL).
 Languages : Python, JAVA and C

Work Experience:
Information Security Analyst
ASTRIX TECHNOLOGIES PVT LTD
January 2010 – September 2011, Bangalore
 Monitored security systems for any and all signs of Intruders or fraudulent
activity.
 Carrying out vulnerability assessment, network scanning and Penetration
Testing.
 Analyzing the machine to check the status of security in an organization.
 Resolved all fraud and virus infections in coordination with computer security
incident response teams.

Computer Science Professor


LBS College of Engineering, Kasaragod, India
September 2011 –January 2012

 Initiated facilitated and moderated computer science related course


discussions in accordance of curriculum
 Planned designed and revised syllabi curriculum instruction content and
other materials as required
 Provided student body with counsel and direct supervision in laboratory
work and issues with course work
 Stayed abreast of advancements in computing technology programming
and syntax
Information Security Analyst
Spiceland Holidays Pvt Ltd., Kochi, Kerala, India
February 2012-May 2015

 Monitor computer networks for security issues.


 Investigate security breaches and other cyber security incidents.
 Install security measures and operate software to protect systems and
information infrastructure, including firewalls and data encryption
programs.
 Document security breaches and assess the damage they cause.
 Work with security team to perform tests and uncover network
vulnerabilities.
 Fix detected vulnerabilities to maintain a high-security standard.
 Stay current on IT security trends and news.
 Develop company-wide best practices for IT security.
 Perform penetration testing.
 Help colleagues install security software and understand information
security management.
 Research security enhancements and make recommendations to
management.
 Stay up-to-date on information technology trends and security standards.

Personal Information
 DOB: 15/09/1987
 SEX: Female
 Marital Status: Married
 Nationality: India
 Visa Status: Transferable

Anda mungkin juga menyukai