A versatile Cybersecurity professional with 1.5 Years of experience in analyzing security vulnerabilities, investigating incidents, implementinhg robust security measures. Proven ability to identify, assess and mitigate security risks across diverse IT environments. Adept at utilizing cutting-edge tools and methodologies to enhance cybersecurity defenses.
Networking & Security
ArcSight ESM
Splunk
Tenable nessus
Log Analysis
FTK Imager
Encase Imager
Cellebrite UFED
Oxygen forensic detective
Image steganography tool: Steganography hides the secret messages within the host dataset and presence imperceptible and is to be reliably communicated to a receiver. The host dataset is purposely corrupted, but in a covert way, designed to be invisible to an information analysis.
Face Recognition System: It describes face detection and recognition as a mini project undertaken for visual perception and it reports the technologies available in the Open CV library and methodology to implement them by using python.