Dedicated and detail-oriented IT professional with hands-on experience in vulnerability remediation and security hardening of Windows Server environments. Skilled in identifying, analyzing, and mitigating security vulnerabilities across a wide range of Windows operating systems using tools such as BatchPatch, Azure DevOps pipelines, and SCCM. Proven ability to apply patches, configure system settings, and implement best practices in alignment with industry security standards. Experienced in collaborating with security teams, system administrators, and compliance auditors to ensure timely resolution of vulnerabilities. Strong knowledge of Active Directory, Group Policy, PowerShell scripting, and patch management workflows. Committed to proactively improving system security posture and minimizing risk across enterprise environments.
Windows Server Administration: SCCM, BatchPatch, WSUS, and VMware vCenter
Security and Compliance: Vulnerability Remediation
Patch management, security hardening
Cloud Technologies: AWS (EC2, S3, VPC, IAM)
Scripting and automation: PowerShell, Batch, Patch, Bash
System Monitoring and Troubleshooting: Disk Management, Patch Reporting, and Server Issue Resolution
Collaboration: Cross-team collaboration with Security Analysts, System Admins, and Compliance Auditors
Language :Shell scripting basic
Containerization tool : Docker, Kubernetes
Build and CI/CD tools: Maven, Jenkins
Configuration Management: Ansible
Infrastructure as code tool: Terraform
Source code management tool: GIT
Operating system: Windows and Linux
Monitoring Tool: Prometheus and Grafana
Artifactory Tools: Nexus and J frog
Project 2 Name: –Tesco Systems
• Created Infrastructure by using Terraform Tool
• Defined CICD Pipeline in Jenkins implementing Security tools such SAST Tools Snyk
• Created the Container Image and Uploaded it into ECR Repository Systems
• Deployed the application in EKS Kubernetes application
• Utilizing Helm charts for application deployment and management.
• Utilized Prometheus and Grafana for effective monitoring and visualization of project metrics, ensuring optimal performance and troubleshooting capabilities.
• Implemented Continuous Integration and Continuous Delivery including Infrastructure Management and Application Monitoring.
• Finally Published the security report result by using DAST Tools such as OWASP