SlideShare a Scribd company logo
1 of 3
Door No #514
Aratt Felecita Apartment
Begur, 560068, Bangalore, India
+91-9986530034
anoopva@gmail.com
Anoop V A
Objective A responsible position, which offers me constant challenges, which will fully
utilize my proven organizational and interpersonal skills and advancement based
on my merit and value addition in a growing concern.
Strengths
• More than 9 years of experience in C/C++ in various platforms.
• More than 8 years of Network security protocol design.
• Sound knowledge in protocols like, IKE, IKEv2,IPSec, GDOI and
NHRP
• Sound knowledge of software engineering principles and the related
processes.(Agile and waterfall model).
• Development experience on high performance Networking operating
systems like IOS, Linux and VxWorks.
• Good knowledge on version control tools – clear case and SVN.
• Flexible, highly organized individual with the proven ability to adapt
and react quickly in a fast-paced environment.
Skill Set • C/C++
• IKE/IKEv2, IPSec – VPN Solutions.
Experience
2010 Dec – Till Date Cisco Systems India Bangalore, India
Software Engineer
• Development and support for different VPN solution EzVPN, DMVPN,
FlexVPN and GetVPN.
• Development and support for IKE/IKEv2 – IPSec protocol
• Customer interaction – on the VPN solutions support on the live
network.
2007 Aug – 2010 Dec Huawei Technologies Bangalore, India
Software Engineer
• Involved in all the software life cycles of the project ‘IP Security
Component’.
• I have been a great team player and motivator in my team.
• Successfully handled MT projects.
• I have been a part of the ‘Training System’, exclusively implemented by
our department.
2006 June – 2007 Aug Infosys Technologies Hyderabad, India
Software Engineer
• I was working for BT services.
• Developed an automated testing tool for BTQUEBEC.
• Extensively worked in the manual testing process carried out for
BTQUEBEC.
Key Projects
# ESON
Encrypted Secure Overlay Network is centralized security model based on
IPSec protocol. A centralized Key Generating Server(KGS) pushes a key
seed to all the client which is registered to it. Using this key seed the clients
derives a pairwise key b/w two devices with minimal message exchange(2
message).
# iWAN –AKAMAI IPSec Support.
Internet WAN model with AKAMAI network – supporting DmVPN/IPSec
use cases. The feature is mainly from IPSec side to form the IPSec side to
support building the Tunnel over the AKAMAI network.
# GIKEv2
GIKEv2 is the solution that implements the Group Encryption Traffic VPN
over IKEv2. GIKEv2 is site-to-site VPN solution that managed by a central
unit. It enables Multicasting over the IPSec tunnels – usually fit for
ISP/MPLS networks.
# DMVPN
Enhancement and support for the DMVPN solutions. Dynamic
Multipoint VPN enables the device to discover the peer dynamically and
brings the VPN tunnels. It internally used NHRP protocol for dynamic peer
discovery. Its fits in dynamic site-to-site IPSec based VPN solution.
# Flex VPN
Flex VPN is an IKEv2 based solution that integrates all the VPN
solutions in a single umbrella. Flex VPN serves – remote- access and site-to-
site in single construct.
# EzVPN
EzVPN is typical remote-access VPN solution based on IKEv1 protocol.
EzVPN is a powerful and widely used cisco remote-access solution with rich
feature set.
# GDOI
GetVPN is a solution that provides a site-to-site VPN solution – where
the tunnel can carry even multi cast data. This protocol runs over IKEv1 and
mostly used in MPLS/ISP network.
# PKI Support in IKE
RSA based authentication method implementation for IKEv1. It includes
both signature and public key encryption authentication method
# DSCP Support in IPSec
Differentiated Service integration in IPSec tunnels. The idea is to
establish multiple IPSec SA between the same peer with the same proxies –
but with different DSCP bits (according to the configuration). This enables the
encrypted packet to carry the original DSCP policy even on the overlay
transport routing.
# Repeated Authentication in Internet Key Exchange
Re-Authentication mechanism for IKEv2 protocol. This feature
enables the IKEv2 peers to re-authenticate periodically to keep the trust
model.
# Dead Peer Detection
Dead Peer Detection – is a keep alive mechanism used in IKEv1 to
check the liveliness of the peer. This enables faster recovery on network
outage.
# AES Support In IKE
Provided support for IKEv1(ISAKMP) / IKEv2 and IPSec protocol for
different VPN solution designs. Mainly it was sustenance work, and some
optimization for the protocol based on the scale figure requirement and
porting to different platforms etc.
# BTQUEBEC
NMS management for the BT devices. This includes inventory and
management of devices using IBM proviso tool. This includes customization
of the tool to meet the customer requirements.
Achievements
• Received best performer award for the new comer from Huawei
• Two CAP award for solving critical customer issues. Solved more than
100 customer issues.
• Received spark award for team collaboration.
• Spark award for conducting training session to the Sales and Marketing
engineers.
Qualifications *. B.Tech in Computer Science and Engineering - (2000-2004)
College of Engineering, Munnar
University: Cochin University of Science and Technology, Kerala, India.
Passed with 1st Class. (71%)
*. Advance Diploma in Embedded systems. – (2005-2006)
Cranes Varsity Bangalore
*. Linux Administration certification (2004)
NIIT – Kodungallur
Personal Details Permanent Address : Anoop V A
Vadakethalakkal House, Mathilakam P.O
Thrissur, Kerala, India – 680685
Date of Birth : 26 April 1983
Marital Status : Married
Nationality : India

More Related Content

What's hot

Q Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - ConjurQ Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - Conjurconjur_inc
 
Istio : Service Mesh
Istio : Service MeshIstio : Service Mesh
Istio : Service MeshKnoldus Inc.
 
Network Security Open Source Software Developer Certification
Network Security Open Source Software Developer CertificationNetwork Security Open Source Software Developer Certification
Network Security Open Source Software Developer CertificationVskills
 
IBM Datapower Security Scenario with JWS & JWE
IBM Datapower Security Scenario with JWS & JWEIBM Datapower Security Scenario with JWS & JWE
IBM Datapower Security Scenario with JWS & JWEsandipg123
 
DevNetCreate - ACI and Kubernetes Integration
DevNetCreate - ACI and Kubernetes IntegrationDevNetCreate - ACI and Kubernetes Integration
DevNetCreate - ACI and Kubernetes IntegrationHank Preston
 
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)Cisco Canada
 
Kerberos presentation
Kerberos presentationKerberos presentation
Kerberos presentationChris Geier
 
Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkRobb Boyd
 
Monitoring Security Policies for Container and OpenStack Clouds
Monitoring Security Policies for Container and OpenStack CloudsMonitoring Security Policies for Container and OpenStack Clouds
Monitoring Security Policies for Container and OpenStack CloudsPLUMgrid
 
#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome HenryITSitio.com
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificatesStephane Potier
 
Network Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayNetwork Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayJohn ILIADIS
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication ApplicationVidulatiwari
 
Unified Underlay and Overlay SDNs for OpenStack Clouds
Unified Underlay and Overlay SDNs for OpenStack CloudsUnified Underlay and Overlay SDNs for OpenStack Clouds
Unified Underlay and Overlay SDNs for OpenStack CloudsPLUMgrid
 
Jabber making the most of
Jabber making the most ofJabber making the most of
Jabber making the most ofCisco Canada
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case studyMayuri Patil
 

What's hot (20)

Q Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - ConjurQ Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - Conjur
 
Kerberos ppt
Kerberos pptKerberos ppt
Kerberos ppt
 
Kerberos
KerberosKerberos
Kerberos
 
Kerberos
KerberosKerberos
Kerberos
 
Istio : Service Mesh
Istio : Service MeshIstio : Service Mesh
Istio : Service Mesh
 
Network Security Open Source Software Developer Certification
Network Security Open Source Software Developer CertificationNetwork Security Open Source Software Developer Certification
Network Security Open Source Software Developer Certification
 
IBM Datapower Security Scenario with JWS & JWE
IBM Datapower Security Scenario with JWS & JWEIBM Datapower Security Scenario with JWS & JWE
IBM Datapower Security Scenario with JWS & JWE
 
DevNetCreate - ACI and Kubernetes Integration
DevNetCreate - ACI and Kubernetes IntegrationDevNetCreate - ACI and Kubernetes Integration
DevNetCreate - ACI and Kubernetes Integration
 
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
Collaboration d’équipe de nouvelle génération (Partie 1 de 2)
 
Authenticated key exchange protocols
Authenticated key exchange protocolsAuthenticated key exchange protocols
Authenticated key exchange protocols
 
Kerberos presentation
Kerberos presentationKerberos presentation
Kerberos presentation
 
Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your Network
 
Monitoring Security Policies for Container and OpenStack Clouds
Monitoring Security Policies for Container and OpenStack CloudsMonitoring Security Policies for Container and OpenStack Clouds
Monitoring Security Policies for Container and OpenStack Clouds
 
#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry#CiscoLiveLA 2017 Presentacion de Jerome Henry
#CiscoLiveLA 2017 Presentacion de Jerome Henry
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 
Network Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayNetwork Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong Way
 
Kerberos : An Authentication Application
Kerberos : An Authentication ApplicationKerberos : An Authentication Application
Kerberos : An Authentication Application
 
Unified Underlay and Overlay SDNs for OpenStack Clouds
Unified Underlay and Overlay SDNs for OpenStack CloudsUnified Underlay and Overlay SDNs for OpenStack Clouds
Unified Underlay and Overlay SDNs for OpenStack Clouds
 
Jabber making the most of
Jabber making the most ofJabber making the most of
Jabber making the most of
 
Kerberos case study
Kerberos case studyKerberos case study
Kerberos case study
 

Similar to Anoop_VA_CV

Resume_Anurag_Design_Verification_2+_yrs
Resume_Anurag_Design_Verification_2+_yrsResume_Anurag_Design_Verification_2+_yrs
Resume_Anurag_Design_Verification_2+_yrsANURAG KAVADANA
 
Deployment guide c07_554713
Deployment guide c07_554713Deployment guide c07_554713
Deployment guide c07_554713John Yu
 
Varunkdave resume
Varunkdave resumeVarunkdave resume
Varunkdave resumeVarun Dave
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data centerCisco Canada
 
Ajaya_resume
Ajaya_resumeAjaya_resume
Ajaya_resumeAjay K
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxAliMohamed855266
 
NCS: NEtwork Control System Hands-on Labs
NCS:  NEtwork Control System Hands-on Labs NCS:  NEtwork Control System Hands-on Labs
NCS: NEtwork Control System Hands-on Labs Cisco Canada
 
FlexVPNLabHandbook-SAMPLE
FlexVPNLabHandbook-SAMPLEFlexVPNLabHandbook-SAMPLE
FlexVPNLabHandbook-SAMPLETariq Sheikh
 
Design methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa serverDesign methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa serverijmnct
 
Gaurav security profile_5_years_experience
Gaurav security profile_5_years_experienceGaurav security profile_5_years_experience
Gaurav security profile_5_years_experiencegaurav sharma
 
Virtual cpe framework
Virtual cpe frameworkVirtual cpe framework
Virtual cpe frameworkNithin Babu
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation KishoreTs3
 
Virtual firewall framework
Virtual firewall frameworkVirtual firewall framework
Virtual firewall frameworkNithin Babu
 
SPOORTHI_P_Curriculum vitae (1)
SPOORTHI_P_Curriculum vitae (1)SPOORTHI_P_Curriculum vitae (1)
SPOORTHI_P_Curriculum vitae (1)spoorthy shetty
 
YOGAKANNAN_5.7years_Aricent_Networks_Testing
YOGAKANNAN_5.7years_Aricent_Networks_TestingYOGAKANNAN_5.7years_Aricent_Networks_Testing
YOGAKANNAN_5.7years_Aricent_Networks_TestingYoga Kannan
 
Srikanth_testing resume
Srikanth_testing resumeSrikanth_testing resume
Srikanth_testing resumesrikanth Burra
 

Similar to Anoop_VA_CV (20)

Resume_Anurag_Design_Verification_2+_yrs
Resume_Anurag_Design_Verification_2+_yrsResume_Anurag_Design_Verification_2+_yrs
Resume_Anurag_Design_Verification_2+_yrs
 
Vp ns
Vp nsVp ns
Vp ns
 
Deployment guide c07_554713
Deployment guide c07_554713Deployment guide c07_554713
Deployment guide c07_554713
 
pravesh_kumar
pravesh_kumarpravesh_kumar
pravesh_kumar
 
Varunkdave resume
Varunkdave resumeVarunkdave resume
Varunkdave resume
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
 
Ajaya_resume
Ajaya_resumeAjaya_resume
Ajaya_resume
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
 
NCS: NEtwork Control System Hands-on Labs
NCS:  NEtwork Control System Hands-on Labs NCS:  NEtwork Control System Hands-on Labs
NCS: NEtwork Control System Hands-on Labs
 
FlexVPNLabHandbook-SAMPLE
FlexVPNLabHandbook-SAMPLEFlexVPNLabHandbook-SAMPLE
FlexVPNLabHandbook-SAMPLE
 
Design methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa serverDesign methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa server
 
ENSA_Module_8.pptx
ENSA_Module_8.pptxENSA_Module_8.pptx
ENSA_Module_8.pptx
 
Gaurav security profile_5_years_experience
Gaurav security profile_5_years_experienceGaurav security profile_5_years_experience
Gaurav security profile_5_years_experience
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 
Virtual cpe framework
Virtual cpe frameworkVirtual cpe framework
Virtual cpe framework
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
 
Virtual firewall framework
Virtual firewall frameworkVirtual firewall framework
Virtual firewall framework
 
SPOORTHI_P_Curriculum vitae (1)
SPOORTHI_P_Curriculum vitae (1)SPOORTHI_P_Curriculum vitae (1)
SPOORTHI_P_Curriculum vitae (1)
 
YOGAKANNAN_5.7years_Aricent_Networks_Testing
YOGAKANNAN_5.7years_Aricent_Networks_TestingYOGAKANNAN_5.7years_Aricent_Networks_Testing
YOGAKANNAN_5.7years_Aricent_Networks_Testing
 
Srikanth_testing resume
Srikanth_testing resumeSrikanth_testing resume
Srikanth_testing resume
 

Anoop_VA_CV

  • 1. Door No #514 Aratt Felecita Apartment Begur, 560068, Bangalore, India +91-9986530034 anoopva@gmail.com Anoop V A Objective A responsible position, which offers me constant challenges, which will fully utilize my proven organizational and interpersonal skills and advancement based on my merit and value addition in a growing concern. Strengths • More than 9 years of experience in C/C++ in various platforms. • More than 8 years of Network security protocol design. • Sound knowledge in protocols like, IKE, IKEv2,IPSec, GDOI and NHRP • Sound knowledge of software engineering principles and the related processes.(Agile and waterfall model). • Development experience on high performance Networking operating systems like IOS, Linux and VxWorks. • Good knowledge on version control tools – clear case and SVN. • Flexible, highly organized individual with the proven ability to adapt and react quickly in a fast-paced environment. Skill Set • C/C++ • IKE/IKEv2, IPSec – VPN Solutions. Experience 2010 Dec – Till Date Cisco Systems India Bangalore, India Software Engineer • Development and support for different VPN solution EzVPN, DMVPN, FlexVPN and GetVPN. • Development and support for IKE/IKEv2 – IPSec protocol • Customer interaction – on the VPN solutions support on the live network. 2007 Aug – 2010 Dec Huawei Technologies Bangalore, India Software Engineer • Involved in all the software life cycles of the project ‘IP Security Component’. • I have been a great team player and motivator in my team. • Successfully handled MT projects. • I have been a part of the ‘Training System’, exclusively implemented by our department.
  • 2. 2006 June – 2007 Aug Infosys Technologies Hyderabad, India Software Engineer • I was working for BT services. • Developed an automated testing tool for BTQUEBEC. • Extensively worked in the manual testing process carried out for BTQUEBEC. Key Projects # ESON Encrypted Secure Overlay Network is centralized security model based on IPSec protocol. A centralized Key Generating Server(KGS) pushes a key seed to all the client which is registered to it. Using this key seed the clients derives a pairwise key b/w two devices with minimal message exchange(2 message). # iWAN –AKAMAI IPSec Support. Internet WAN model with AKAMAI network – supporting DmVPN/IPSec use cases. The feature is mainly from IPSec side to form the IPSec side to support building the Tunnel over the AKAMAI network. # GIKEv2 GIKEv2 is the solution that implements the Group Encryption Traffic VPN over IKEv2. GIKEv2 is site-to-site VPN solution that managed by a central unit. It enables Multicasting over the IPSec tunnels – usually fit for ISP/MPLS networks. # DMVPN Enhancement and support for the DMVPN solutions. Dynamic Multipoint VPN enables the device to discover the peer dynamically and brings the VPN tunnels. It internally used NHRP protocol for dynamic peer discovery. Its fits in dynamic site-to-site IPSec based VPN solution. # Flex VPN Flex VPN is an IKEv2 based solution that integrates all the VPN solutions in a single umbrella. Flex VPN serves – remote- access and site-to- site in single construct. # EzVPN EzVPN is typical remote-access VPN solution based on IKEv1 protocol. EzVPN is a powerful and widely used cisco remote-access solution with rich feature set. # GDOI GetVPN is a solution that provides a site-to-site VPN solution – where the tunnel can carry even multi cast data. This protocol runs over IKEv1 and mostly used in MPLS/ISP network. # PKI Support in IKE RSA based authentication method implementation for IKEv1. It includes both signature and public key encryption authentication method # DSCP Support in IPSec Differentiated Service integration in IPSec tunnels. The idea is to establish multiple IPSec SA between the same peer with the same proxies – but with different DSCP bits (according to the configuration). This enables the encrypted packet to carry the original DSCP policy even on the overlay transport routing. # Repeated Authentication in Internet Key Exchange Re-Authentication mechanism for IKEv2 protocol. This feature enables the IKEv2 peers to re-authenticate periodically to keep the trust model.
  • 3. # Dead Peer Detection Dead Peer Detection – is a keep alive mechanism used in IKEv1 to check the liveliness of the peer. This enables faster recovery on network outage. # AES Support In IKE Provided support for IKEv1(ISAKMP) / IKEv2 and IPSec protocol for different VPN solution designs. Mainly it was sustenance work, and some optimization for the protocol based on the scale figure requirement and porting to different platforms etc. # BTQUEBEC NMS management for the BT devices. This includes inventory and management of devices using IBM proviso tool. This includes customization of the tool to meet the customer requirements. Achievements • Received best performer award for the new comer from Huawei • Two CAP award for solving critical customer issues. Solved more than 100 customer issues. • Received spark award for team collaboration. • Spark award for conducting training session to the Sales and Marketing engineers. Qualifications *. B.Tech in Computer Science and Engineering - (2000-2004) College of Engineering, Munnar University: Cochin University of Science and Technology, Kerala, India. Passed with 1st Class. (71%) *. Advance Diploma in Embedded systems. – (2005-2006) Cranes Varsity Bangalore *. Linux Administration certification (2004) NIIT – Kodungallur Personal Details Permanent Address : Anoop V A Vadakethalakkal House, Mathilakam P.O Thrissur, Kerala, India – 680685 Date of Birth : 26 April 1983 Marital Status : Married Nationality : India