This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Nishanthkumarpathi"

From OWASP
Jump to: navigation, search
(Over Internet)
Line 6: Line 6:
 
Risk Assessment, Vulnerability Assessment, Penetration Testing, Perimeter Security, Incident handling, Log Analysis, Intrusion monitoring and networking.
 
Risk Assessment, Vulnerability Assessment, Penetration Testing, Perimeter Security, Incident handling, Log Analysis, Intrusion monitoring and networking.
  
Deft in planning & managing entire IT infrastructure setup which includes assessment of hardware /software requirements , negotiation of purchase , installation & configuration of entire IT infrastructure in line with business requirements and migration of data from legacy systems.
+
Deft in planning & managing entire IT infrastructure set-up which includes assessment of hardware /software requirements , negotiation of purchase , installation & configuration of entire IT infrastructure in line with business requirements and migration of data from legacy systems.
 
Assessing organizational requirements for security & implementing security software system against various attacks; executing backup strategy etc.
 
Assessing organizational requirements for security & implementing security software system against various attacks; executing backup strategy etc.
  
Line 21: Line 21:
 
Juniper Networks Certified Associate - Junos <br>
 
Juniper Networks Certified Associate - Junos <br>
  
== Over Internet ==
+
== Contributions ==
 +
 
 +
* [https://www.owasp.org/index.php/Secure_Configuration_Guide Secure Configuration Guide]
 +
 
 +
== Online ==
 
* [http://nishanth.co.in/ Portfolio]
 
* [http://nishanth.co.in/ Portfolio]
 
* [http://in.linkedin.com/in/nishanthkumarpathi Linkedin Profile]
 
* [http://in.linkedin.com/in/nishanthkumarpathi Linkedin Profile]
 +
* [http://www.slideshare.net/pathinishanth/presentations Presentations on Slideshare]
 +
 +
== Contact ==
 +
 
* [https://twitter.com/nishanthkumarp @nishanthkumarp on Twitter]
 
* [https://twitter.com/nishanthkumarp @nishanthkumarp on Twitter]
* [http://www.slideshare.net/pathinishanth/presentations Presentations on Slideshare]
 

Revision as of 15:12, 24 October 2015

Summary

Nishanth Kumar is a dynamic professional with an experience in Information Security, Network Security Analysis, and Compliance functions, Linux Administration, System Administration & Management to ensure secure information processing environment.

Skills

Risk Assessment, Vulnerability Assessment, Penetration Testing, Perimeter Security, Incident handling, Log Analysis, Intrusion monitoring and networking.

Deft in planning & managing entire IT infrastructure set-up which includes assessment of hardware /software requirements , negotiation of purchase , installation & configuration of entire IT infrastructure in line with business requirements and migration of data from legacy systems. Assessing organizational requirements for security & implementing security software system against various attacks; executing backup strategy etc.

Knowledge in IT Security, Business Continuity, Risk Management and Security Audits.

Documenting business process, drafting Policy / Procedures in line with ISMS standard, reviewing Business Continuity and Disaster Recovery plans & Generation of metrics review reports.

Knowledge on auditing concepts.

Certifications

Juniper Networks Certified Professional - Security
Juniper Networks Certified Specialist - Security
Juniper Networks Certified Associate - Junos

Contributions

Online

Contact