Home   |   Sitemap |   About us |   Resources |   Testimonials
 
 
Employer's Register   |   Employer's Priority Membership   |   Freelancer's Register   |   Freelancer's Priority Membership
Home | Profile View
 
Profile Id: 134209    17-Feb-2017
 
 
Title:   Corporate Trainer
Name:   SAKET LABH ()
Location:   New Delhi - Delhi -
VIEW COMPLETE CONTACT DETAILS
 
 
Corporate Trainers  
  • Computer Hardware & Networking Trainers
  • I.T Trainers
  • Technologies (Windows
  • Linux
  • Unix Etc.)
  • Programming Languages (Java
  • C/C++
  • Python Etc.)
  • Database (Sql
  • Oracle
  • Sybase Etc.)
  • Networking/Ms Servers/Admin/Security
 
 

Dear Patron ,

I prefer type of work - Part-Time, Full-Time, Contract Basis. Expecting remuneration in terms of Per Day of appx. Rs.7000 Per Day.

My Skill - Linux,Cisco,python,C/C++,Project Management, ISO 27001, Cryptography, Risk Management,Information Security, Network Security, Networking, Project Management.

My prefered location for assignment - Anywhere

I as a company deals in - Informaation Security, Network Security, Networking, Project Management .

Jobs handled -

ISMS implementation in organization, data centre and DR sites as per ISO 27001:2013 in an organization of 500 peoples

Asset identification, classification, gap analysis and risk management as per ISO 31000 framework.

Write policies and procedure as per ISO 27001:2013 to achieve the desired state and get the approval from the higher authority

Selection of control to be implemented for mitigating risk and transferring some of the risk to third party.

Create Network and security architecture, Implementation strategy, Project Management Plan and selecting tools, technologies for the Implementation

Create Incident Response Team, Do Regular Mock drill, Development of near and far disaster recovery sites and BCP scenario testing

Forcing background verification checks and policy for social engineering attacks

Conduct Internal auditing of ISMS as per ISO 27001:2013, create audit plan

Faced External audit three times and successfully able to maintain ISO certification for the organization

Technologies used are Virtualization, Blade Server, Access Control, Encryption, Backup on magnetic tape with encryption enabled, Storage Area Network(SAN), Blade Server

Configuration and Managing Firewall, VPN, Bulk Encrypter, Vulnerability Management Tool, Fiber optical network, SIEM Tools, Antivirus, email and web server

Create Design, Architecture, Project Management Plan and development of Next Generation Firewall having following functionalities

Stateful filtering and attack prevention schemes using iptables, nftables, ipset and kernel module of netfilter.

Data plane programming using Intel DPDK technologies, implement network stack, routing, filtering in DPDK and communication to host for Application Layer filtering.

Deep packet inspection using snort signatures & Squid for SSL decryption and web data filtering

Intensive log generation, log analysis and creating sms and email alert on selected event.

Implementation of dynamic routing protocol OSPF, RIP v2 and BGP using zebra and Quagga tools.

Create Design, Architecture and Project Management Plan for development of IDS & IPS by using methods Pattern Matching(PM) and Profile comparison(PC).

Development and testing of Intrusion Prevention mechanism using Rule-based (PM), Signature-Based (PM), Knowledge-based (PM), Statistical-Based(PC), Anomaly-based (PC) and Behavior-based (PC).

.


ISMS implementation in organization, data centre and DR sites as per ISO 27001:2013 in an organization of 500 peoples

Asset identification, classification, gap analysis and risk management as per ISO 31000 framework.

Write policies and procedure as per ISO 27001:2013 to achieve the desired state and get the approval from the higher authority

Selection of control to be implemented for mitigating risk and transferring some of the risk to third party.

Create Network and security architecture, Implementation strategy, Project Management Plan and selecting tools, technologies for the Implementation

Create Incident Response Team, Do Regular Mock drill, Development of near and far disaster recovery sites and BCP scenario testing

Forcing background verification checks and policy for social engineering attacks

Conduct Internal auditing of ISMS as per ISO 27001:2013, create audit plan

Faced External audit three times and successfully able to maintain ISO certification for the organization

Technologies used are Virtualization, Blade Server, Access Control, Encryption, Backup on magnetic tape with encryption enabled, Storage Area Network(SAN), Blade Server

Configuration and Managing Firewall, VPN, Bulk Encrypter, Vulnerability Management Tool, Fiber optical network, SIEM Tools, Antivirus, email and web server

Create Design, Architecture, Project Management Plan and development of Next Generation Firewall having following functionalities

Stateful filtering and attack prevention schemes using iptables, nftables, ipset and kernel module of netfilter.

Data plane programming using Intel DPDK technologies, implement network stack, routing, filtering in DPDK and communication to host for Application Layer filtering.

Deep packet inspection using snort signatures & Squid for SSL decryption and web data filtering

Intensive log generation, log analysis and creating sms and email alert on selected event.

Implementation of dynamic routing protocol OSPF, RIP v2 and BGP using zebra and Quagga tools.

Create Design, Architecture and Project Management Plan for development of IDS & IPS by using methods Pattern Matching(PM) and Profile comparison(PC).

Development and testing of Intrusion Prevention mechanism using Rule-based (PM), Signature-Based (PM), Knowledge-based (PM), Statistical-Based(PC), Anomaly-based (PC) and Behavior-based (PC).


.