Jan 2014 - Dec 2014
Jun 2014 - Aug 2014
System Administration Intern
Grantham, Mayo, van Otterloo & Co.
- Provided Microsoft and VMWare administration and user support using vSphere, vSphere Orchestrator and MS System Center Configuration Manager (MS SCOM).
- Built custom dashboards for monitoring and service level tracking for Active Directory and MS Exchange systems.
- Deployed Windows host-based firewall on remote laptops through group policy objects. Provided administration of MS DirectAccess technology to provide secure remote access.
- Contributed in remediation of penetration testing results, by securely configuring production servers.
Aug 2013 - Dec 2013
Identity Access Management Intern
State Street Corportation
- Provided requirement gathering, role definition and access governance for IT teams, project management for phased rollout of the User Provisioning System.
- Ensured dissemination and approval of access information from IT managers and proper communication with the external vendor for exchanging access data sheets.
- Contributed in development of audit compliance reports, test cases, access governance workflows and user manual for the UPS.
May 2013 - Jul 2013
Security Compliance Intern
- Configured secure VPN Access between Virtual machines on an OpenStack cloud using Vyatta Networking OS.
- Deployed Active Directory at IQSS public labs with a domain trust with Harvard’s AD domain.
- Upgraded Nessus Vulnerability scanner, tested its automation scripts and generated vulnerability reports for lab systems.
- Created a business case for the use of IBM QRadar SIEM and Checkpoint firewalls.
- Security research for implementing security controls – PKI infrastructure, two-factor authentication, NetApp storage
Birla Institute of Technology and Science
Sep 2012 - Dec 2014
MS Information Assurance
Foundations in Information Assurance, Computer Systems Security, Network Security Practices, Software Security Practices, Forensics, Cyber Law, Security Risk Management and Capstone Project.
The Evolution of the role of a CSO/CISO into an executive role, Risk Management for Advanced Persistent Threats, Auditing Access Management Infrastructure and Policies for Campus Card Services.