This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Nishanthkumarpathi"
Line 1: | Line 1: | ||
+ | == Summary == | ||
Nishanth Kumar is a dynamic professional with an experience in Information Security, Network Security Analysis, and Compliance functions, Linux Administration, System Administration & Management to ensure secure information processing environment. | Nishanth Kumar is a dynamic professional with an experience in Information Security, Network Security Analysis, and Compliance functions, Linux Administration, System Administration & Management to ensure secure information processing environment. | ||
− | + | == Skills == | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | Skills | ||
Risk Assessment, Vulnerability Assessment, Penetration Testing, Perimeter Security, Incident handling, Log Analysis, Intrusion monitoring and networking. | Risk Assessment, Vulnerability Assessment, Penetration Testing, Perimeter Security, Incident handling, Log Analysis, Intrusion monitoring and networking. | ||
Line 20: | Line 15: | ||
Knowledge on auditing concepts. | Knowledge on auditing concepts. | ||
+ | == Certifications == | ||
+ | |||
+ | JUNIPER NETWORKS CERTIFIED PROFESSIONAL - SECURITY<br> | ||
+ | JUNIPER NETWORKS CERTIFIED SPECIALIST - SECURITY<br> | ||
+ | JUNIPER NETWORKS CERTIFIED ASSOCIATE - JUNOS<br> | ||
== Over Internet == | == Over Internet == |
Revision as of 05:27, 22 October 2015
Summary
Nishanth Kumar is a dynamic professional with an experience in Information Security, Network Security Analysis, and Compliance functions, Linux Administration, System Administration & Management to ensure secure information processing environment.
Skills
Risk Assessment, Vulnerability Assessment, Penetration Testing, Perimeter Security, Incident handling, Log Analysis, Intrusion monitoring and networking.
Deft in planning & managing entire IT infrastructure setup which includes assessment of hardware /software requirements , negotiation of purchase , installation & configuration of entire IT infrastructure in line with business requirements and migration of data from legacy systems. Assessing organizational requirements for security & implementing security software system against various attacks; executing backup strategy etc.
Knowledge in IT Security, Business Continuity, Risk Management and Security Audits.
Documenting business process, drafting Policy / Procedures in line with ISMS standard, reviewing Business Continuity and Disaster Recovery plans & Generation of metrics review reports.
Knowledge on auditing concepts.
Certifications
JUNIPER NETWORKS CERTIFIED PROFESSIONAL - SECURITY
JUNIPER NETWORKS CERTIFIED SPECIALIST - SECURITY
JUNIPER NETWORKS CERTIFIED ASSOCIATE - JUNOS