resume_devanshigoyal

1
Devanshi Goyal Boston, MA- 02120 | [email protected] | (516) 849-7034 LinkedIn URL: https://www.linkedin.com/in/devanshigoyal Available: January-August 2017 EDUCATION Northeastern University, Boston, MA College of Computer and Information Science, GPA: 3.7 Candidate for a Master of Science in Information Assurance Expected graduation: Dec 2017 Related Courses: Foundation of Information Assurance, Network Security Practices, Cyber law, Applied Cryptography, Security Risk Management and Assessment Related Projects: Northeastern University Project Boston, MA Jan. – Apr., 2016 Conducted a series of pen-tests using passive and active tools (FOCA, Maltego, Recon-NG, SHODAN, theHarvester and more) on a targeted website. Performed a brute force attack using the metadata collected to discover the password to log into a cloud server. Tools used: THC Hydra, John the ripper, CEWL. Configured Cisco Routers and Firewall using Cisco Packet Tracer. Configured a number of ACLs on Snort IDS to allow only specific traffic to penetrate through the network. University of Delhi, New Delhi, India Bachelor of Science in Computer Science, GPA: 3.9 June 2015 Related Courses: Information Security, Algorithms, Database Management Systems TECHNICAL KNOWLEDGE High Level Languages: C, C++, C#, SQL, JAVA, Python Operating Systems: OS X, WINDOWS, Tufin OS, UNIX/LINUX, Kali Linux Tools: GNS3, Cisco ASDM, VMware, Microsft Sql Server 2008, Microsoft Visual Studio 2010, Oracle DB, Logisim, PROLOG, Nessus, FOCA, Maltego, InSSIDer, SiteDigger, Wireshark, Nmap, Cisco Packet Tracer, NetWitness Certification: Tufin Certified Security Expert (August 2016) WORK EXPERIENCE Network Security Intern, White Wings Technologies, New York May-Sept.,2014 Gained in-depth knowledge and understanding of designing virtual networks in GNS3 and monitoring the networked devices such as ASA firewalls, Cisco Routers etc. via Tufin SecureTrack, SecureChange and SecureApp. Ensured that firewall and security policies are optimized to enable business agility while meeting the most stringent security and compliance requirements. ACADEMIC PROJECTS Online Movie Ticketing software University of Delhi New Delhi, India Sept-Dec., 2014 Developed a Windows application for booking movie tickets online using MySql and Visual Studio. Prepared a highly detailed project report depicting E-R diagrams, Structure charts, Data Flow Diagrams, Cyclomatic Complexity of the software and Function-Point Analysis. Inventory Management Software University of Delhi New Delhi, India Jan – Apr., 2015 Developed an Inventory Management software using MS Sql Server 2008 R2 at backend and MS Visual Studio using C# at front end for an IT software company. Programmed and tested complex queries in MS Sql Server. ACADEMIC RESEARCH PAPERS MITIGATION OF SECURITY RISKS IN EMV-CHIP CREDIT CARD TRANSACTIONS Northeastern University Paper Boston, MA Jan. – Apr., 2016 The paper emphasizes the need for a transition from magnetic stripe cards to EMV chip-enabled cards and effectiveness of EMV technology in mitigating the security issues posed by magnetic stripe cards. COPYRIGHT PROTECTION IN CYBERSPACE- A COMPARATIVE STUDY OF THE USA AND INDIA Northeastern University Paper Boston, MA May-Aug., 2016 The paper explains the copyright laws of two countries- USA and India in the light of copyright protection of their works in cyberspace.

Upload: devanshi-goyal

Post on 27-Jan-2017

19 views

Category:

Documents


0 download

TRANSCRIPT

Devanshi Goyal Boston, MA- 02120 | [email protected] | (516) 849-7034

LinkedIn URL: https://www.linkedin.com/in/devanshigoyal

Available: January-August 2017

EDUCATION

Northeastern University, Boston, MA College of Computer and Information Science, GPA: 3.7 Candidate for a Master of Science in Information Assurance Expected graduation: Dec 2017 Related Courses: Foundation of Information Assurance, Network Security Practices, Cyber law, Applied Cryptography, Security Risk Management and Assessment Related Projects: Northeastern University Project Boston, MA Jan. – Apr., 2016

Conducted a series of pen-tests using passive and active tools (FOCA, Maltego, Recon-NG, SHODAN, theHarvester and more) on a targeted website.

Performed a brute force attack using the metadata collected to discover the password to log into a cloud server. Tools used: THC Hydra, John the ripper, CEWL.

Configured Cisco Routers and Firewall using Cisco Packet Tracer. Configured a number of ACLs on Snort IDS to allow only specific traffic to penetrate through the network.

University of Delhi, New Delhi, India Bachelor of Science in Computer Science, GPA: 3.9 June 2015 Related Courses: Information Security, Algorithms, Database Management Systems

TECHNICAL KNOWLEDGE

High Level Languages: C, C++, C#, SQL, JAVA, Python Operating Systems: OS X, WINDOWS, Tufin OS, UNIX/LINUX, Kali Linux Tools: GNS3, Cisco ASDM, VMware, Microsft Sql Server 2008,

Microsoft Visual Studio 2010, Oracle DB, Logisim, PROLOG, Nessus, FOCA, Maltego, InSSIDer, SiteDigger, Wireshark, Nmap, Cisco Packet Tracer, NetWitness

Certification: Tufin Certified Security Expert (August 2016)

WORK EXPERIENCE

Network Security Intern, White Wings Technologies, New York May-Sept.,2014

Gained in-depth knowledge and understanding of designing virtual networks in GNS3 and monitoring the networked devices such as ASA firewalls, Cisco Routers etc. via Tufin SecureTrack, SecureChange and SecureApp.

Ensured that firewall and security policies are optimized to enable business agility while meeting the most stringent security and compliance requirements.

ACADEMIC PROJECTS Online Movie Ticketing software University of Delhi New Delhi, India Sept-Dec., 2014

Developed a Windows application for booking movie tickets online using MySql and Visual Studio.

Prepared a highly detailed project report depicting E-R diagrams, Structure charts, Data Flow Diagrams, Cyclomatic Complexity of the software and Function-Point Analysis.

Inventory Management Software University of Delhi New Delhi, India Jan – Apr., 2015

Developed an Inventory Management software using MS Sql Server 2008 R2 at backend and MS Visual Studio using C# at front end for an IT software company.

Programmed and tested complex queries in MS Sql Server.

ACADEMIC RESEARCH PAPERS MITIGATION OF SECURITY RISKS IN EMV-CHIP CREDIT CARD TRANSACTIONS Northeastern University Paper Boston, MA Jan. – Apr., 2016

The paper emphasizes the need for a transition from magnetic stripe cards to EMV chip-enabled cards and effectiveness of EMV technology in mitigating the security issues posed by magnetic stripe cards.

COPYRIGHT PROTECTION IN CYBERSPACE- A COMPARATIVE STUDY OF THE USA AND INDIA Northeastern University Paper Boston, MA May-Aug., 2016

The paper explains the copyright laws of two countries- USA and India in the light of copyright protection of their works in cyberspace.