This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Nishanthkumarpathi"
(→Over Internet) |
|||
Line 6: | Line 6: | ||
Risk Assessment, Vulnerability Assessment, Penetration Testing, Perimeter Security, Incident handling, Log Analysis, Intrusion monitoring and networking. | Risk Assessment, Vulnerability Assessment, Penetration Testing, Perimeter Security, Incident handling, Log Analysis, Intrusion monitoring and networking. | ||
− | Deft in planning & managing entire IT infrastructure | + | Deft in planning & managing entire IT infrastructure set-up which includes assessment of hardware /software requirements , negotiation of purchase , installation & configuration of entire IT infrastructure in line with business requirements and migration of data from legacy systems. |
Assessing organizational requirements for security & implementing security software system against various attacks; executing backup strategy etc. | Assessing organizational requirements for security & implementing security software system against various attacks; executing backup strategy etc. | ||
Line 21: | Line 21: | ||
Juniper Networks Certified Associate - Junos <br> | Juniper Networks Certified Associate - Junos <br> | ||
− | == | + | == Contributions == |
+ | |||
+ | * [https://www.owasp.org/index.php/Secure_Configuration_Guide Secure Configuration Guide] | ||
+ | |||
+ | == Online == | ||
* [http://nishanth.co.in/ Portfolio] | * [http://nishanth.co.in/ Portfolio] | ||
* [http://in.linkedin.com/in/nishanthkumarpathi Linkedin Profile] | * [http://in.linkedin.com/in/nishanthkumarpathi Linkedin Profile] | ||
+ | * [http://www.slideshare.net/pathinishanth/presentations Presentations on Slideshare] | ||
+ | |||
+ | == Contact == | ||
+ | |||
* [https://twitter.com/nishanthkumarp @nishanthkumarp on Twitter] | * [https://twitter.com/nishanthkumarp @nishanthkumarp on Twitter] | ||
− |
Revision as of 15:12, 24 October 2015
Summary
Nishanth Kumar is a dynamic professional with an experience in Information Security, Network Security Analysis, and Compliance functions, Linux Administration, System Administration & Management to ensure secure information processing environment.
Skills
Risk Assessment, Vulnerability Assessment, Penetration Testing, Perimeter Security, Incident handling, Log Analysis, Intrusion monitoring and networking.
Deft in planning & managing entire IT infrastructure set-up which includes assessment of hardware /software requirements , negotiation of purchase , installation & configuration of entire IT infrastructure in line with business requirements and migration of data from legacy systems. Assessing organizational requirements for security & implementing security software system against various attacks; executing backup strategy etc.
Knowledge in IT Security, Business Continuity, Risk Management and Security Audits.
Documenting business process, drafting Policy / Procedures in line with ISMS standard, reviewing Business Continuity and Disaster Recovery plans & Generation of metrics review reports.
Knowledge on auditing concepts.
Certifications
Juniper Networks Certified Professional - Security
Juniper Networks Certified Specialist - Security
Juniper Networks Certified Associate - Junos