Detail-oriented and proactive configuration specialist with a strong background in technical and business fields. Proven track record of delivering high-quality configuration solutions that meet client requirements and adhere to best practices and standards. Exceptional analytical, communication, and problem-solving skills, with a keen eye for detail and a commitment to excellence.
1. Detection of Deep Fakes using Blockchain MAY 2023 – SEP 2023
• Used Deep Learning and Blockchain technology to analyze deep fakes in the database.
• Employed deep learning algorithms to analyze and identify manipulated media.
• Utilized blockchain technology for secure storage, verification of media authenticity and processing of data.
2. Cloud Security JAN 2023 – MAY 2023
• Multi-Cloud Deployment: Utilized both Google Cloud and Microsoft Azure as cloud platforms to host our website.
• Implemented a Cloud Armor, Web Application Firewall (WAF) to protect against SQL injection and Cross- Site Scripting (XSS) attacks, safeguarding data integrity and user security.
• Developed security Policies against command injection, HTTP request smuggling, HTTP response splitting, and remote file inclusion attacks, minimizing vulnerabilities.
• Ensured adherence to HTTP protocol standards and developed defenses against violations and anomalies, enhancing overall application security.
• Improved network security, ensuring the protection of sensitive data and scalability for educational needs. misconfigurations, enforced security policies, and enhanced SSH and network configurations for load balancing, backend connectivity, DDoS protection, and DNS security, ensuring a holistic security posture.
3. Network Security and Penetration Testing of Network OCT 2022 – JAN 2023
• Conducted a comprehensive analysis and enhancement of NCI College network infrastructure for increased security.
• Evaluated the network architecture, pinpointing vulnerabilities, and security gaps.
• Implemented essential network devices, including modems, routers, switches, and firewalls.
• Developed a robust network design to accommodate the college's complex infrastructure.
• Deployed security measures, such as firewall configurations and access controls, to fortify the network.
• Conducted penetration testing using industry-standard tools to identify vulnerabilities.
• Provided detailed recommendations and implemented mitigation solutions.
• Created comprehensive network documentation, including diagrams and security policies.
• Improved network security, ensuring the protection of sensitive data and scalability for educational needs.
https://www.linkedin.com/in/raj-koli/