SACHIN JOON
About Candidate
Information Security Intermediate with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing, testing and security framework for cloud-based software. Versed in robust network defense strategies. |
Education
computer Applications Basics to Advance Excel, Power point, Word, Tally(accounting) Diploma: Cyber Forensics Great Learning - New Delhi
Computer Forensics Investigation Process Understanding Hard Disks and File Systems Data Acquisition and Duplication Defeating Anti-Forensics Technique Windows Forensics Linux and Mac Forensics Network Forensics Investigating Web Attacks Dark Web Forensics Database Forensics Cloud Forensics Investigating Email Crimes Malware Forensics Mobile Forensics IoT Forensics
Amazon Web Services (AWS) is a secure cloud services platform that helps to improve efficiency and provides assistance to run business operations smoothly. It is used for programming models, operating systems, databases, and architectures. It is used to perform complex OLAP queries. It is used for AWS service to create a fully managed search engine for your website. It is used for hosting an app or website and create a shared file system for your team. It is used for serving large files, sending transactional email, and adding a CDN (Content Delivery Network) in AWS.
Work & Experience
Linux Tools & Commands Done Penetration Testing along with finding the vulnerabilities Information Security Networking (CISCO) Demonstrated advanced understanding of business processes, internal control risk management, IT controls and related standards Planned and completed group projects, working smoothly with others Maintained updated knowledge through continuing education and advanced training Configured tooling changes to prevent security breaches and improve network security.
Performed network, application, system penetration testing across company's product suite. Designed and delivered innovative security solutions across cyber security functions with focus on threat detection and network security. Planned and completed group projects, working smoothly with others.
Exploiting Android Architecture and Application Framework. Application Vulnerabilities and Exploits ( IDOR , OAuth Tokens 2FA, LFI, SQL, Injection, Insufficient Anti Automation) Designed tests and tools to break into security-protected applications and networks to probe for vulnerabilities Recommended IT security improvements to achieve system confidentiality, integrity and availability. Used analysis from attack simulations to identify gaps in threat detection or response. A project on Android Application Penetration Testing Report