Accomplished Database Architect with extensive experience at Vehere Technologies, specializing in data pipelines and ETL processes. Proven ability to lead teams and drive innovative solutions using Python and AWS. Adept at fostering collaboration and delivering high-quality results in fast-paced environments.
1. Cyber Terrorism Threat: Cyber terrorism refers to the use of digital tools and cyber-attacks to disrupt critical infrastructure, spread fear, or advance political or ideological goals. In cybersecurity, it poses a significant threat as terrorists target government systems, financial networks, or public utilities to cause chaos. These attacks may include hacking, data breaches, ransomware, or Distributed Denial-of-Service (DDoS) attacks aimed at destabilizing nations or organizations. Combating cyber terrorism requires strong cybersecurity measures, international cooperation, and advanced threat detection systems to prevent large-scale disruptions and protect sensitive data.
2. Network Security in Enterprise Banking Systems, Banks and financial institutions rely on robust network security measures to protect sensitive data, prevent cyberattacks, and ensure regulatory compliance. Key features include firewalls (next-gen and application-aware) to filter malicious traffic, intrusion detection/prevention systems (IDS/IPS) to monitor and block threats in real time, and end-to-end encryption (TLS, VPNs) to secure transactions Multi-factor authentication (MFA) and zero-trust architecture restrict unauthorized access, while segmented networks isolate critical systems (e.g., payment processing) from less secure zones Advanced AI-driven threat detection tools analyze anomalies, and SIEM (Security Information and Event Management) solutions like Splunk provide centralized monitoring. Regular penetration testing and patch management further harden defenses against evolving cyber threats, ensuring trust and operational integrity in banking networks.
3. Central Management System (CMS), In banking cybersecurity, a unified platform that enables banks to monitor, control, and manage security policies, threats, and compliance across their entire IT infrastructure. Key features include Centralized Monitoring, Policy Enforcement, Threat Detection & Response, Compliance Management, User Access Control and Automated Updates & Patching.
4.Migration Data lakes, One of the enterprise clients of vehere wants to migrate his on-premises data lake (Elasticsearch) from 5.5 to 7.10.2. This data belongs to network monitoring data of 60 days which was nearly 10TB and the cluster belongs to six data nodes data center. I complete this migration in 10 days without any downtime. The complete plan and action were taken care of by me.
5. Cigna Data Lake Implementation (Accenture), I was associated with the implementation of the data lake project (Hadoop, Podium with python and spark). Cigna, the healthcare giant, was associated with Accenture and I was a team member of that implemented project. I am leading that team from the Data Warehouse (Hive and Spark), including Sqoop job creation Our source was oracle, DB2 and the data migrated to Hadoop.
Seeking a Data Architect role to design and implement cutting-edge data solutions that drive business growth and innovation.