SANTHOSH M P
About Candidate
An accomplished and proficient IT Security Engineer with over 5+ years of invaluable experience in implementing and monitoring Security (VAPT and Penetration) projects to ensure company success. Familiar and adept at working with engineering, industrial engineering, change management, and business transformation systems. Accustomed to handling IT Security support, managing IT Security projects, and supporting various engineering departments with IT Security tools (Qualys, Nessus, and Sentinel One) and applications (Web & Mobile). Brings forth a motivated attitude and the ability to establish strong and productive relationships with other company members. |
Education
Work & Experience
• Assessed standards against agreed measures to achieve quality assurance. • Reviewed construction activities for compliance with health and safety requirements. • Audited health and safety procedures for full compliance. • Liaised with material providers to negotiate price and schedule availability to align with project stages. • Guided projects to meet timescales, budgets and agreed specifications. • Coordinated engineers and construction professionals to meet varied project demands. • Researched, surveyed and inspected sites to review and improve construction plans. • Resolved unexpected technical difficulties and communicated solutions with clients and representatives. • Established new preliminary analysis procedures for topographical and hydrological factors.
• Developed and maintained documentation for equipment, including operating instructions and maintenance records. • Collaborated with other departments to identify and resolve technical issues, resulting in improved operational efficiency. • Developed preventive maintenance strategies that reduced the need for emergency repairs and improved machine uptime • Monitored and adjusted equipment parameters to optimize system performance and reduce downtime.
• Set up, optimizer and managed network equipment. • Operated server management tools for patching, monitoring and backup activity. • Sought and implemented IT improvements to minimize service disruptions. • Improved and maintained existing IT processes and system documentation to create easy to use reference guides. • Analysed intricate server issues and supported large enterprise and business-critical applications. • Installed and maintained IT equipment and software to meet workflow requirements. • Monitored networks using Solar Winds to develop robust IT solutions. • Worked with internal support teams, outsourced managed service providers and suppliers for comprehensive end-user setup and support.
• Configured network equipment for installations, performed lifecycle refreshes and performed post-installation testing for turnkey services. • Managed network performance and implemented changes to improve efficiency. • Maintained hardware and software for networks and assisted in installation and upgrade of servers. • Diagnosed and resolved complex network problems. • Contacted manufacturers and vendors for warranty repairs and replacements. • Interacted and negotiated with vendors and contractor s to secure network products and services. • Responded to network security breaches by identifying, troubleshooting and resolving vulnerabilities to protect clients. • Developed and implemented policies and associated training plans for network administration and disaster recovery. • Conducted research on products, protocols and standards to remain abreast of developments in networking industry. • Collaborated with other teams to support new network installation and provide cross-functional solutions • Created and maintained documentation to understand traffic flows and identify bottlenecks. • Engineered and implemented technology solutions to support network systems, software and hardware for businesses. • Managed and maintained network firewalls, routers, and switches to ensure maximum performance and reliability. • Assisted in the design and implementation of new network infrastructure, including LAN/WAN, wireless, and VoIP. • Created and maintained detailed network documentation, including network diagrams and device configurations.
• Analyses, solved and corrected issues on databases, networks, software and hardware in real-time. • Web Application security testing, Vulnerability Assessment, penetration testing and generating reports using tools. • Design, & Integration experience on Security information and Event management solutions (SIEM). • Background/understanding of software development lifecycle. • Excellent communication skills with proven abilities in resolving complex networking, hardware & software related issues. • Upgraded system software and hardware regularly to defend against emerging threats and maintain performance. • Investigated breaches and removed viruses and malware impacting information security and system usability. • Created in-depth reports and recommendations from penetration findings, including security issues, risk levels and improvements required. • Configured tooling changes to prevent security breaches and improve network security. • Presented security reports to clients and stakeholders, communicating complex technical information clearly too varying audiences. • Simulated security breaches to test system safety and reliability and pinpoint vulnerabilities. • Improved business internet security by determining system weaknesses and implementing robust software solutions. • Advised clients on new products, systems or upgrades to minimize the risk of potential security breaches. • Set up and maintained firewalls on servers, workstations and network hardware. • Partnered with security team to identify and validate requirements governing database and networking activities. • Designed data recovery processes for emergencies, data theft or system malfunctions. • Coordinated database and hardware upgrades through installation, design, testing and deployment.
• Managed database projects from start to completion, with focus on using optimum practices for designing, constructing, modifying, integrating, implementing and testing software. • Upgraded system software and hardware regularly to defend against emerging threats and maintain performance. • Analyzed, solved and corrected issues on databases, networks, software and hardware in real-time. • Investigated breaches and removed viruses and malware impacting information security and system usability. • Managed IT projects, aiding technical development in line with department strategy. • Managed system cybersecurity, implementing firewall, anti-virus software, and VPN for fewer cyber-attacks. • Monitored new releases and models for optimized system performance. • Installed hardware and software components for reliable network system. • Assessed latest innovations and adopted cost-effective, useful solutions.