SlideShare a Scribd company logo
1 of 3
Download to read offline
Expert-Profile
Arvind K. Singh
+91-7369022955, +91-7491802656
6-Patel Nagar, Nadesar, Varanasi-221002-U.P.
musketeerc@gmail.com
https://in.linkedin.com/in/arvindisalone
Professional
Profile
InfoSec Expert skilled at finding the highest quality security personnel and
discovering effective solutions to safety risks and concerns. Confident Security
Manager successful at making critical decisions quickly and effectively. Meets
security challenges calmly and rationally. I’m an Information Security
professional who specializes in loss prevention and human resource safety
functions. Committed to providing security with innovative, high-tech
equipment.
I do poses Expertise on following skill-sets:
 Website and portal
monitoring
 Data privacy
 Network maintenance
 Data back-up and
retrieval
 System upgrades
 Technical specifications
creation
 Network upgrades
 Remote access technology
 Excellent communication skills
 Coding and modularization
 Excellent diagnostic skills
 Refined system debugging skills
 Security personnel training
 Network and server exploitation and testing
 HIPAA training
 PII expert
 PCI security
Training
Accomplishments
Delivered Live training sessions to various corporate houses and educational
institutes on Information Security and Ethical hacking. Topics included but not
limited to are :
 Information security
 Ethical hacking
 Data encryption and security
 Network security
 Security awareness
 Rise of singularity
 Phishproof training
 Protecting mobile data and services
 Appropriate use of social media
 Social engineering
 Defeating social engineers
 Physical security
 Working remotely
 Cloud security
 Exploitation
 Metasploit
Expert-Profile
 Internet of things and home security
Trained junior and senior members of management and IT team on Security
assurance and security. Topics included but not limited to :
 Network security
 Troubleshooting of data circuits
 Red flag identity theft prevention
 Privileged user security
 Data and records retention
 PCI essentials for cardholder data handlers and supervisors
 PCI requirements overview for IT personnel
 HIPAA/HITECH privacy for business associates and covered entities to
safeguard Protected health information (PHI)
 HIPAA/HITECH security for protecting medical records and all PHI
 Working with different types of data
 Security awareness on Personal identity information (PII)
 Physical security of information
 Network security modules and mechanism
 Malware analysis
 Cyber forensics basics
 File sharing and encryption over networks
 P2P encryption mechanisms
 Managing VPNs.
Delivered live industrial workshops on various computer technology subjects. Topics
included but not limited to :
 Metasploit
 Kali Linux
 Penetration testing
 VMware modules, installation and use
 PHP
 Python
 Using various CMS’s
 SQL Server and related modules
 Creating DBMS
 Core development technologies
 CCNA
 Linux Red Hat and Openstack
 Wireshark and sniffing tools
 Auto-CAD
 Solaris Admin
 Citrix
 Dot Net all modules and versions
 Ethical hacking
Expert-Profile
Work History Through July 2015 to present
Information Security Advisor, to various corporates (8 to be precise), across the globe
Through February 2016 to Present
Chief Executive Office, Nirmal World Pvt Ltd, Varanasi-India
Through January 2015 to November 2015
Co-founder and CISO, CyberInjection Inc., New York, USA
Other Work Experiences
 Worked as freelance web and app developer for various persons and
organizations through July 2008 to October 2014.
 Worked as freelance projects manager for various development and testing
projects for various desktop and web projects.
 Worked as an ethical hacker for various organizations.
 Worked as penetration tester for various websites
 Continuously working as a bug bounty hunter.
Education Ph.D. in Information Assurance and Security
Colorado Technical University
Denver-USA
Expecting Convocation in Jan 2017
M.Tech. in Computer Science and Engineering
Indian Institute of technology
Patna-India
Grad of 2011
B.tech. in Computer Science and Engineering
Institute of Engineering and Technology-UPTU
Lucknow-India
Grad of 2008
Three years diploma (Polytechnic) in Electrical Engineering
Board of technical Education
Uttar Pradesh-India
Grad of 2005
References [References are available upon request.]

More Related Content

What's hot

The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityPECB
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008Jim Geovedi
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Emrah Alpa, CISSP CEH CCSK
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Asiri Hewage
 
Application Security
Application SecurityApplication Security
Application Securityonenolesguy
 
Thread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal
 
Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...
Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...
Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...hardik soni
 
Cyber Security Services
Cyber Security ServicesCyber Security Services
Cyber Security ServicesSaratechnology
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Mukesh Chinta
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesDr. Rajesh P Barnwal
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information ProtectionMicrosoft Österreich
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architectureDenise Bailey
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityDistil Networks
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Mukesh Chinta
 

What's hot (20)

IoT Security
IoT SecurityIoT Security
IoT Security
 
The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Security Aspects in IoT - A Review
Security Aspects in IoT - A Review Security Aspects in IoT - A Review
Security Aspects in IoT - A Review
 
Application Security
Application SecurityApplication Security
Application Security
 
Thread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 Security
 
Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...
Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...
Leo TechnoSoft’s Intelligence Driven SOC is integrated Context-aware Security...
 
Cyber Security Services
Cyber Security ServicesCyber Security Services
Cyber Security Services
 
Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2Cisco cybersecurity essentials chapter - 2
Cisco cybersecurity essentials chapter - 2
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research Challenges
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Malcolm Boston Resume
Malcolm Boston ResumeMalcolm Boston Resume
Malcolm Boston Resume
 

Similar to Profile-Arvind

Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
 
Prabhu Resume
Prabhu ResumePrabhu Resume
Prabhu ResumePrabhu P
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”Moshiul Islam, CISSP, CISA, CFE
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec trainInfosecTrain
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016Adel Zayed
 
CV of IT Security Professional
CV of IT Security ProfessionalCV of IT Security Professional
CV of IT Security ProfessionalAjay Upadhyay
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training CourseRicky Lionel Vaz
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxinfosec train
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE360 BSI
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE360 BSI
 
Donna Schmidt Resume
Donna Schmidt ResumeDonna Schmidt Resume
Donna Schmidt ResumeDonna Robeck
 

Similar to Profile-Arvind (20)

Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
Prabhu Resume
Prabhu ResumePrabhu Resume
Prabhu Resume
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
 
Information Security Analyst- Infosec train
Information Security Analyst- Infosec trainInformation Security Analyst- Infosec train
Information Security Analyst- Infosec train
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016
 
CV of IT Security Professional
CV of IT Security ProfessionalCV of IT Security Professional
CV of IT Security Professional
 
CISSP Certification Training Course
CISSP Certification Training CourseCISSP Certification Training Course
CISSP Certification Training Course
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
Resume-DPITVlinkedin
Resume-DPITVlinkedinResume-DPITVlinkedin
Resume-DPITVlinkedin
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Brief on my skill sets
Brief on my skill setsBrief on my skill sets
Brief on my skill sets
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
digital strategy and information security
digital strategy and information securitydigital strategy and information security
digital strategy and information security
 
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAEIT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
IT Information Security Management Principles, 23 - 26 November 2015 Dubai UAE
 
Yazeed Resume (UPDATED) 2.1
Yazeed Resume (UPDATED) 2.1Yazeed Resume (UPDATED) 2.1
Yazeed Resume (UPDATED) 2.1
 
Embedding Security in IT Projects
Embedding Security in IT ProjectsEmbedding Security in IT Projects
Embedding Security in IT Projects
 
Donna Schmidt Resume
Donna Schmidt ResumeDonna Schmidt Resume
Donna Schmidt Resume
 

Profile-Arvind

  • 1. Expert-Profile Arvind K. Singh +91-7369022955, +91-7491802656 6-Patel Nagar, Nadesar, Varanasi-221002-U.P. musketeerc@gmail.com https://in.linkedin.com/in/arvindisalone Professional Profile InfoSec Expert skilled at finding the highest quality security personnel and discovering effective solutions to safety risks and concerns. Confident Security Manager successful at making critical decisions quickly and effectively. Meets security challenges calmly and rationally. I’m an Information Security professional who specializes in loss prevention and human resource safety functions. Committed to providing security with innovative, high-tech equipment. I do poses Expertise on following skill-sets:  Website and portal monitoring  Data privacy  Network maintenance  Data back-up and retrieval  System upgrades  Technical specifications creation  Network upgrades  Remote access technology  Excellent communication skills  Coding and modularization  Excellent diagnostic skills  Refined system debugging skills  Security personnel training  Network and server exploitation and testing  HIPAA training  PII expert  PCI security Training Accomplishments Delivered Live training sessions to various corporate houses and educational institutes on Information Security and Ethical hacking. Topics included but not limited to are :  Information security  Ethical hacking  Data encryption and security  Network security  Security awareness  Rise of singularity  Phishproof training  Protecting mobile data and services  Appropriate use of social media  Social engineering  Defeating social engineers  Physical security  Working remotely  Cloud security  Exploitation  Metasploit
  • 2. Expert-Profile  Internet of things and home security Trained junior and senior members of management and IT team on Security assurance and security. Topics included but not limited to :  Network security  Troubleshooting of data circuits  Red flag identity theft prevention  Privileged user security  Data and records retention  PCI essentials for cardholder data handlers and supervisors  PCI requirements overview for IT personnel  HIPAA/HITECH privacy for business associates and covered entities to safeguard Protected health information (PHI)  HIPAA/HITECH security for protecting medical records and all PHI  Working with different types of data  Security awareness on Personal identity information (PII)  Physical security of information  Network security modules and mechanism  Malware analysis  Cyber forensics basics  File sharing and encryption over networks  P2P encryption mechanisms  Managing VPNs. Delivered live industrial workshops on various computer technology subjects. Topics included but not limited to :  Metasploit  Kali Linux  Penetration testing  VMware modules, installation and use  PHP  Python  Using various CMS’s  SQL Server and related modules  Creating DBMS  Core development technologies  CCNA  Linux Red Hat and Openstack  Wireshark and sniffing tools  Auto-CAD  Solaris Admin  Citrix  Dot Net all modules and versions  Ethical hacking
  • 3. Expert-Profile Work History Through July 2015 to present Information Security Advisor, to various corporates (8 to be precise), across the globe Through February 2016 to Present Chief Executive Office, Nirmal World Pvt Ltd, Varanasi-India Through January 2015 to November 2015 Co-founder and CISO, CyberInjection Inc., New York, USA Other Work Experiences  Worked as freelance web and app developer for various persons and organizations through July 2008 to October 2014.  Worked as freelance projects manager for various development and testing projects for various desktop and web projects.  Worked as an ethical hacker for various organizations.  Worked as penetration tester for various websites  Continuously working as a bug bounty hunter. Education Ph.D. in Information Assurance and Security Colorado Technical University Denver-USA Expecting Convocation in Jan 2017 M.Tech. in Computer Science and Engineering Indian Institute of technology Patna-India Grad of 2011 B.tech. in Computer Science and Engineering Institute of Engineering and Technology-UPTU Lucknow-India Grad of 2008 Three years diploma (Polytechnic) in Electrical Engineering Board of technical Education Uttar Pradesh-India Grad of 2005 References [References are available upon request.]