Uploaded by Nishant Raina

Nqeyehdndo-8382&2

advertisement
NISHANT RAINA
Phone: (647)764-1444 Address: 166 Hupfield Trail, Scarborough, ON, M1B 4P7 Email: nishantraina@outlook.com
PROFESSIONAL SUMMARY
Results-driven Cybersecurity Professional with a proven track record in implementing robust security measures to enhance overall
system security. Specializing in vulnerability assessment, network security, and threat mitigation, expertise lies in securing diverse
environments. Proactive approach includes securing server hardware elements, resulting in a substantial boost in server security
performance. Adept at developing and maintaining comprehensive system documentation, contribution to increased user adoption and
a simultaneous reduction in user-related security issues. Skilled in encryption technologies, compliance assessments, and incident
response, commitment to elevating organizational security postures through effective cybersecurity measures.
WORK EXPERIENCE
Security and Compliance Analyst
Walmart
02/2021 – Present
Canada
→ Enforcing stringent security measures within safe work processes and emergency procedures to uphold a resilient security posture.
→ Providing ongoing guidance to staff on security protocols, ensuring a culture of continuous security awareness and adherence.
→ Conducting tailored security-focused training sessions for associates, placing a strong emphasis on scanning accuracy, EAS system
security, and overall safety compliance.
Cybersecurity Systems Analyst (Contract-Parttime)
Orco Networks Inc.
02/2022 – 02/2023
Canada
→ Implemented robust cybersecurity measures during the setup, fine-tuning, and enhancement of operating systems, application
software, and system management tools, resulting in a remarkable 30% improvement in overall system security.
→ Developed and maintained comprehensive system documentation, including user manuals and procedures, contributing to a notable
25% increase in user adoption and concurrently reducing user-related security issues by 15%.
→ Proactively secured server hardware elements, including storage, memory, and processors, leading to a substantial 20% boost in
server security performance and an impressive 10% reduction in hardware-related security issues.
Azure Security Administrator
Splen Technologies & Education Pvt Ltd
06/2019 - 06/2020
India
→ Orchestrated Identity Access management of Azure Subscriptions, Azure AD, Azure AD Application Proxy, Azure AD Connect,
and Azure AD Pass-through Authentication with a focus on cybersecurity.
→ Resolved intricate Azure AD security issues related to Office 365, Active Directory to AzureAD, and CAIDM to Active Directory.
→ Designed, configured, and maintained Active Directory Services on Windows Server 2003, 2008, 2012, and 2016, emphasizing
security enhancements.
EDUCATION
Cloud Computing for Big Data
Lambton College
2020-2022
Toronto
Bachelor of Technology in Computer Science Engineering
Beant College of Engineering and Technology
2015-2019
India
CERTIFICATIONS
✓
✓
✓
✓
CompTIA Security+ ce
Cybersecurity Foundations: Governance, Risk, and Compliance (GRC)
LinkedIn ISO 27001:2013-Compliant Cybersecurity
Level 1 - Cyber Threat Hunting Training
04/2023-04/2026
07/05/2023
07/03/2023
05/2023
PROJECTS
Android Penetration Testing App | 2018
•
•
•
•
Engineered an Android penetration testing application using Kali Linux, showcasing expertise in ethical hacking practices.
•
•
•
Engineered a Python-based Windows Intrusion Detection System with keylogger functionality for capturing and logging keystrokes.
Utilized the Metasploit Framework to select effective exploits and employed Msfvenom for tailored Android system payloads.
Leveraged the Meterpreter framework to establish secure sessions and demonstrated proficiency in penetration testing.
Applied social engineering techniques for seamless installation on target devices, ensuring comprehensive testing and evaluation.
Windows Intrusion Detection System (WIDS) | 2017
Integrated scheduled screenshot capture to enhance visibility, demonstrating a proactive approach to threat detection.
Designed secure log handling features to mitigate the risk of malicious exploitation and showcase an understanding of cybersecurity
measures.
SKILLS
•
•
•
•
Vulnerability Assessment
Firewall Configuration
Encryption Technologies
Incident Response
•
•
•
•
•
•
Security Best Practices •
Security Monitoring
•
Network Security
Risk Management
IDS/SIEM/ IAM
Threat Hunting Techniques
Windows, Linux
Cloud Security
•
•
•
•
Threat Mitigation
Basic Penetration Testing
Compliance Assessments
Cryptography
Download