8
Mohit Chauhan Contact: +60133410314 Email: [email protected], SENIOR NETWORK SECURITY ENGINEER OBJECTIVE To work in a creative and challenging environment using cutting edge technologies in an organization where innovation finds its way & skills are utilized towards continuous growth and advancement. SUMMARY More than 6.0 Years of experience in- Network Security Implementations in New Projects. Superior breadth of experience in network administration and information security. Excellent proficiency with encryption, firewalls, authorization methodologies, and Web filtering authentication. Configuration & Implementation of the Local Risk Environment on central Management Gateway. Controlling web application, controlling web operations on the Bluecoat Proxy. Configuring policies to block network web apps & configure the policies to allow the trusted users, firewall VPN access method, control HTTPS/HTTP traffic on the Firewalls and other Security Devices. Profound facility with security policies & Rules development, implementation and enforcement. Experience on making security of cloud data. Sound grasp of working in the managed services environment. Hands on experience in Cyber Security and threat management. High skills in data analysis and network security threat identification. Strong expertise in detecting intrusions via network scans. Strong experience in implementation of HIDS & HIPS in the networks. Exceptional skills in critical issue identification and resolution. Outstanding skills in conveying complex technical information clearly and accessibly. Experience in Application Security and implementation and configuration of DLP. Experience in implementation of ISO27001 ISMS Framework Policies and procedure in organizations. Installation, Maintenance, Security and Configuration of the various Projects.

Mohit Chauhan CV

Embed Size (px)

Citation preview

Page 1: Mohit Chauhan CV

Mohit ChauhanContact: +60133410314

Email: [email protected],

SENIOR NETWORK SECURITY ENGINEER

OBJECTIVETo work in a creative and challenging environment using cutting edge technologies in an organization where innovation finds its way & skills are utilized towards continuous growth and advancement.

SUMMARY

More than 6.0 Years of experience in- Network Security Implementations in New Projects. Superior breadth of experience in network administration and information security. Excellent proficiency with encryption, firewalls, authorization methodologies, and Web filtering

authentication. Configuration & Implementation of the Local Risk Environment on central Management Gateway. Controlling web application, controlling web operations on the Bluecoat Proxy. Configuring policies to block network web apps & configure the policies to allow the trusted users, firewall

VPN access method, control HTTPS/HTTP traffic on the Firewalls and other Security Devices. Profound facility with security policies & Rules development, implementation and enforcement. Experience on making security of cloud data. Sound grasp of working in the managed services environment. Hands on experience in Cyber Security and threat management. High skills in data analysis and network security threat identification. Strong expertise in detecting intrusions via network scans. Strong experience in implementation of HIDS & HIPS in the networks. Exceptional skills in critical issue identification and resolution. Outstanding skills in conveying complex technical information clearly and accessibly. Experience in Application Security and implementation and configuration of DLP. Experience in implementation of ISO27001 ISMS Framework Policies and procedure in organizations. Installation, Maintenance, Security and Configuration of the various Projects. Maintenance & Troubleshooting of complex Security of Networks & OS updated technology. Very good Experience in HA configuration on the firewalls. Hands on experience on Forti Manager and Analyzer. Very good Experience in virtualization of the firewall like VDOM & ADOM or Contexting. Experience in Switching, Access List, NAT, Static Nat, Dynamic Nat, NAT Overloading. Knowledge about IPsec VPN & SSL VPN. Strong Understanding in Virtual implementation of Firewalls. Designing and implementing Of Wi-Fi. Basic Knowledge of VoIP (Voice over Internet Protocol). Managing and Configuring Vlans in Virtual Environment. Knowledge of All level Of Security under the organization. Experience in SIEM tools like IBM Qradar and Secure vue.

Page 2: Mohit Chauhan CV

PROFESSIONAL EXPERIENCE Proven technical and analytical skills, with sound understanding and skill of Security & ISO27001 ISMS

Framework Policies and procedure while structuring customize the solutions to meet organization’s specific needs.

Technically sophisticated & result driven IT Professional, with an experience of 6.0 years, spearheading with AMK TECHNOLOGIES PVT LTD MALAYSIA as Senior Network Security Engg from 25 May 2016 to till Date Working at HP MALAYSIA on the payroll of AMK.

Technically sophisticated & result driven IT Professional, with an experience of 6.0 years, spearheading with NETPARTICIPATE LLP Chandigarh as Senior Network Security Engg from 08 Sep 2015 to 17 May 2016.

Technically sophisticated & result driven IT Professional, with an experience of 6.0 years, spearheading with ALBION INFOTEL LTD Green Park Delhi as the Network Security Engineer (L2), from Dec 2014 to July 2015.

Technically sophisticated & result driven IT Professional, with an experience of 6.0 years, spearheading with ETHICSOFT TECHNOLOGIES PVT LTD.Bangalore as the System & Network Engineer (L2), from Aug 2014 to Dec 2015. Working at Myntra.com on the payroll of Ethicsoft.

Technically sophisticated & result driven IT Professional, with an experience of 6.0 years, spearheading with PROGRESSIVE INFOTECH PVT LTD. PHASE-2, Noida (U.P) as the System & Network Engineer(L2), from May 2014 to Aug 2014. Working at IGL (Indrprastha Gas Ltd) on the payroll of Progressive.

Technically sophisticated & result driven IT Professional, with an experience of 6.0 years, spearheading with PROGRESSIVE INFOTECH PVT LTD. PHASE-2, Noida (U.P) as the System & Network Engg, from Oct 2013 to May 2014. Working at GAIL INDIA LTD on the payroll of Progressive.

Technically sophisticated & result driven IT Professional, with an experience of 6.0 years, spearheading with INNOGURU TECHNOLOGY PVT LTDas the Network Support Engg(L1), from Dec 2010 to Oct 2013.

TECHNICAL PROFICIENCY

Clients Windows 2k professional, Windows XP, Windows 7,Win 8, server 2k8

Antivirus MacAfee, Symantec Server, Trend Micro

Hardware Cisco, HP, HCL, IBM and Dell Desktops, Dell and IBM Laptops, Acer, Lenovo, Fort iGATE

Technical Support Remote Desktop Support, Firewall Troubleshooting, data center mgmt.

Security& wi-fi Forti-AP 222B Outdoor Forti-AP 320B indoor device, Cisco IDS/IPS, Tipping Point IPS Cisco wi-fi controller 2504,Cisco 5585,Cisco AP 2602,CiscoWAP 4410

Bluecoat Proxy Blue coat Proxy SG 300, Proxy SG 200 (Implementation of proxy in network, controlling web application, controlling web operations, configuring policies to block network web apps, configure the policies to allow the trusted users, firewall vpn access method, control https etc.)

Firewall Exp Macafee s4016, Sonicwall 4500 and sonicwall 2400, Cisco 5505,Cisco 5510, Checkpoint R75 Fortigate 100C, Fortigate 800C, Fortigate 300C, Fortigate 300D, Fortigate 500D, Fortigate 1000D, Fortigate 1000C, Fortigate 1200D, Fortigate 3000D,Fortigate 3600C.

Fortigate Exp FortiManager 4000-E, FortiAnalyzer 3500E, ADOM, VDOM

L B F5 BIG IP SIEM TOOL Secure Vue 3.6, IBM Qradar

Ticketing Tool Service Now, HPSM

TECHNICAL EXPERIENCE

Page 3: Mohit Chauhan CV

Cisco Firewalls & Extreme Switches:-- How to Create vlan’s on a given network and how to configure vlans. Strong Experience in ACL’s Experience in NAT, PAT and NAT Overloading. Strong Knowledge about Port Security. Good Knowledge about Security policies.

Handling Extreme summit X 460 series 16404 POE switches.

Cisco & HP Routers:--

Knowledge about Routing Protocols like RIP, EIGRP, OSPF. Handling Cisco Routers 2600, 2900.7900 and 800 series. How to manage OSPF Protocol on Cisco & HP Routers. Handling Leased lines, Radio Link Connectivity.

Firewalls EXperience:--

Configure SSL VPN & IPSEC VPN over the firewalls. Implement the NAT/PAT on firewall and prepare the Local Risk Environment. Configuration and management of the ADOM and VDOM. Configure Zones LAN, WAN, DMZ, WLAN over the firewall. Configure HA service on the firewalls. Monitoring to the traffic on the firewall and check the threats according to the policies. Configure app control and access rules in the network. Prepare policies according to the Local Risk. Provide and configure port for VoIP with SIP. Control and configure the indoor AP-320 and outdoor AP-222B. Update the firmware and maintain the backup of firewall. Configure content filtering services(CFS). Configure network interfaces LAN,WAN,DMZ,WLAN. VPN point to point routing configuration. Work on the forti platform and many forti os. Bandwidth Mgmt according to the application or interface. Configuration of LB according to the bandwidth and traffic load.

PROFESSIONAL QUALIFICATION

CERTIFICATION

Cisco Training Network Associate CCNA & CCNP (Security) CEH ISO27001 COB IT

M.C.A (Computer Applications) International Institute of Management and Technology Meerut(U.P)

2009

Ist

B.S.C(Computer Science) Rohilkhand University Bareilly 2005 IInd

Page 4: Mohit Chauhan CV

JOB RESPONSIBILITIES Analyze, troubleshoot, and investigate security-related, information systems’ anomalies based on security

platform reporting, network traffic, log files, host-based and automated security alerts. Maintain, configure, and analyze network and host-based security platforms: Vulnerability scanning systems and tools Network-based Intrusion Detection/Prevention Systems (IDS/IPS) Host-based Intrusion Detection/Prevention Systems (HIDS/HIPS) File integrity verification and monitoring software Security Information & Event Management (SIEM) platform Application (Layer 7) Firewall Network Access Control (NAC) Data Loss Prevention (DLP) Log Indexing and Correlation platform Anti-virus and anti-spyware console Firewall and network access controls lists Web and E-mail proxy and filtering systems Physical access control systems Provide off-hours support on an infrequent, but as needed basis. Successfully manage time and technical responsibilities, set accurate expectations and meet deliverable

deadlines while working in a team and information sharing environment. Advanced knowledge as it relates to troubleshooting and resolving problems quickly and effectively in a

production environment Basic understanding of security best practices for Linux and Windows systems General understanding of various IT security concepts as they relate to production environments Working knowledge of Internet Protocols, Networking, TCP/IP, AWS applications Ability to read and understand system, OS and application log files 2+ years of industry experience with network and security. Strong organizational, analytical, and communication skills Ability to foster and maintain both a positive team culture and service-centric environment Security certifications/course experiences are beneficial Provide IDS monitoring, log analysis and incident response to information security alerts. Analyze log files, network traffic and IDS alerts to assess, prioritize and differentiate between potential

intrusion attempts and false alarms. Launch and track investigations to resolution. Advise in the steps to take to investigate and resolve

computer security incidents. Recommend IDS filters to eliminate false positives. In addition, daily reviews of IT security news postings

reporting exploits in the wild and potential zero-day exploits. Perform highly complex analysis and technical tasks involving event detection and rapid response across

various environments of the enterprise. Design, implement and support integration of information security solutions including security architectures,

firewall administration, integrating security products, and developing and coordinating security implementation plans.

Work with senior management to determine acceptable levels of risk for enterprise computing platforms and to discuss security implications of new information technology uses being considered.

Investigate, document and report any actual or potential information security violation. Lead computer forensic analysis, cyber-crime investigation, incident emergency response and

investigations.

Page 5: Mohit Chauhan CV

Responsibilities at Progressive Infotech Pvt Ltd Noida

Network security Infrastructure Setup in New projects. Superior breadth of experience in network administration and information security. Excellent proficiency with encryption, firewalls, authorization methodologies, and Web filtering

authentication Profound facility with security policy development, implementation and enforcement Sound grasp of a variety of Internet protocols High skills in data analysis and network security threat identification Strong expertise in detecting intrusions via network scans Exceptional skills in critical issue identification and resolution Outstanding skills in conveying complex technical information clearly and accessibly

Responsibilities at Myntra.com .

Designing of the wi-fi Network with AP configuration and authentication and making the wi-fi security. Signal strength checking and control the every wi-fi device on the network. Handling Cisco Switches 2851, 2960 and 3560. Wi-fi Network Printers, Attendance Machine, Barcode Scanner Support Handling fiberoptic switches and Extreme switches Data Center Support Internet lease line & telephone line support UPS system maintenance & support. Mobile/Data card Purchase & Support. PA system Support & Maintenance. Laptop/Desktop Policy Hardware Inventory Management for all locations. Support to all Network equipment. EPBAX System Support & Maintenance Manage MPLS Connectivity and Internet Leased Line Link. Prioritize tasks and schedule work accordingly. Managing and measuring processes compliance to established company policies/procedures. Tuning and performance of Hardware/Networking & Client Server Infrastructure.

Responsibilities at Albion Infotel Ltd Analyze, troubleshoot, and investigate security-related, information systems’ anomalies based on security

platform reporting, network traffic, log files, host-based and automated security alerts. Maintain, configure, and analyze network and host-based security platforms: Vulnerability scanning systems and tools Network-based Intrusion Detection/Prevention Systems (IDS/IPS) Host-based Intrusion Detection/Prevention Systems (HIDS/HIPS) File integrity verification and monitoring software Security Information & Event Management (SIEM) platform Application (Layer 7) Firewall Network Access Control (NAC) Data Loss Prevention (DLP) Log Indexing and Correlation platform Anti-virus and anti-spyware console Firewall and network access controls lists Web and E-mail proxy and filtering systems Physical access control systems Provide off-hours support on an infrequent, but as needed basis. Successfully manage time and technical responsibilities, set accurate expectations and meet deliverable

deadlines while working in a team and information sharing environment.

Page 6: Mohit Chauhan CV

Responsibilities at Netparticipate LLP

Cisco firewall configuration for a setup of mail data center. Performing analysis of network security needs and contributes to design, integration, and installation of

hardware and software. Analyzing, troubleshooting and correcting network problems remotely and on-site. Maintaining and administering perimeter security systems such as firewalls and intrusion detection

systems. Engineer, implement and monitor security measures for the protection of computer systems, networks and

information Identify and define system security requirements Design computer security architecture and develop detailed cyber security designs Prepare and document standard operating procedures and protocols Configure and troubleshoot security infrastructure devices Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate

repeatable tasks Ensure that the company knows as much as possible, as quickly as possible about security incidents Write comprehensive reports including assessment-based findings, outcomes and propositions for further

system security enhancement

Present address:

HP Global Center. Persiaran Rimba Permai, Cyber 8CyberjayaSelangor63000Malaysia

Date of Birth: 09-05-1985; Language Known: English & Hindi; Sex: Male; Nationality: Indian

DeclarationI hereby declare that the above written particulars are true to the best of my knowledge and belief.

Date: ………….

Place- cyberjaya (MOHIT CHAUHAN)