SlideShare a Scribd company logo
1 of 1
Download to read offline
Saransh Raj Burman
201 South 4th Street, Apt # 735, San Jose, CA, 95112 | 818-943-7775 | saransh.burman@sjsu.edu
Objective: Electrical Engineering Graduate from SJSU, experience in networking and wireless domain seeking Full time/Co-op
opportunity, Available Immediately.
Education
San Jose State University (August 2014-May 2016)
Master of Science in Electrical Engineering (GPA-3.56/4)
Maharshi Dayanand University, India (August 2008-May 2012)
Bachelor of Technology in Electrical Engineering (GPA- 3.77/4)
Technical Skills
Certifications: CCNA: Cisco Certified Network Associate (Routing and Switching) # CSCO12993123
Languages: C, C++, Python, UNIX, LINUX
Networking : TCP/IP, UDP, BGP, OSPF, RIP, ARP, DHCP, DNS, SIP, H.323, MPLS, SDN, VLAN, VPN, STP, SNMP, Virtualization
Concepts: Wi-Fi, 802.11(n/ac) routers, Cisco Networking/routers, OSI Model, Telnet, switching, PJSIP, Firewall, BT, Zigbee
Tools: GNS3, Wireshark, Putty, VMware, PyCharm, X-lite, Iperf, Ixia Chariot, RvR, TeraTerm, Cygwin, Kiwi syslog
Security and Testing: Penetration testing, Cryptography (AES, DES, RSA), Metasploit, IDS/IPS, IPSec, Ettercap
Experience
Broadcom Limited (August 2015-May 2016)
Designation: Wireless Network Intern
 Debugging, Configuring, and Testing Routers at AP (802.11n/ac) and WLAN Stations.
 Testing of dual/Tri band Wi-Fi routers and Access points at different RF levels (2.4G and 5G) and environments like Range
versus Rate (RVR) and Over the Air (OTA) performance evaluation in terms of Throughput and Bandwidth Utilization.
 Configuring, implementing and debugging Multi user-MIMO technology, Band steering and 160 MHZ channel.
 Planning, Designing and Implementing LAN, WLAN environments, including configuration development, based on design
schematics of routers and debug customer related problems.
Allied Moulded Enclosure Products India Pvt. Ltd. (September 2012-April 2014)
Designation: Business Development Executive
 Design, Implement and Drive strategies for sales and marketing for the success of India business.
 Research and develop plans which identify marketing opportunities and new project development.
Academic Project
Centralized Network Monitoring and Management
 Created a network in GNS3 and divided it into three parts monitored and managed by three different network administrator.
 Configured OSPF, SNMP and Syslog to send all the network information to database and from database to the GUI created.
 Alerts for the network were sent as notifications to GUI for network administrator to troubleshoot and manage the network.
VoIP Call using PJSIP
 Successfully implemented SIP protocol using PJSIP libraries and developed a client side application exchanging media
between three clients via SIP proxy server in an Ad-hoc network
Throughput Analysis in different environments
 Observed the effect on throughput with changing conditions and parameters by setting up test environments.
 Performed the test with real hardware: 2.4G vs 5G frequency spectrum, UDP vs TCP and OTA vs Conducted box.
DNS Hijacking implementation and Man in the Middle attack (MITM) attack defense mechanism
 Simulated DNS hijacking and MITM attack on Deterlab with ARP spoofing, Gained hands on experience with security attacks
and defenses. Successfully compared and evaluated security-related algorithms, protocols and solutions.
 Language used: LINUX
Simulation of label switching networks (MPLS) using NS3 tool
 Successfully Simulated a Label-switched network topology through NS3 simulation tool and MPLS module. The project
implemented a C++ program to enable label switching from Ingress to Egress of a defined topology.
Global Network Design using cisco packet tracer
 Led a team of 5 members and successfully designed, configured and implemented a secure network from the Internet Service
Provider (ISP) perspective for an organization located in three different countries using Cisco Packet Tracer. Implemented:
Spanning tree protocol (STP), Virtual local area network (VLAN), VLAN Trunking protocol (VTP), Border gateway protocol
(BGP), Static routing, Network address translation (NAT) and Port security.
Setting up Hacking Lab and performing Penetration Testing
Conducted various experiments demonstrating exploitation techniques and mitigations using setups on DeterLab
 ARP poisoning MITM attack followed by DNS spoofing using Ettercap.
 Vulnerability analysis using Nessus and Port stealing & Mac-flooding attacks in switches.

More Related Content

What's hot

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...IEEEGLOBALSOFTTECHNOLOGIES
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEEMEMTECHSTUDENTPROJECTS
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...IEEEGLOBALSOFTTECHNOLOGIES
 
Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithmskitechsolutions
 
PhD-Guidance-and-Works-with-Source-Codes
PhD-Guidance-and-Works-with-Source-CodesPhD-Guidance-and-Works-with-Source-Codes
PhD-Guidance-and-Works-with-Source-CodesPhdtopiccom
 
Network Simulation for Master Thesis
Network Simulation for Master ThesisNetwork Simulation for Master Thesis
Network Simulation for Master ThesisPhdtopiccom
 
Network Security IEEE 2015 Projects
Network Security IEEE 2015 ProjectsNetwork Security IEEE 2015 Projects
Network Security IEEE 2015 ProjectsVijay Karan
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Kumar Goud
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...DMV SAI
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
 
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...LogicMindtech Nologies
 
Samir_Tazarine_Resume3
Samir_Tazarine_Resume3Samir_Tazarine_Resume3
Samir_Tazarine_Resume3Samir Tazarine
 

What's hot (20)

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
IEEE 2014 DOTNET DATA MINING PROJECTS A robust multiple watermarking techniqu...
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
 
Yashasvi
YashasviYashasvi
Yashasvi
 
Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithms
 
PhD-Guidance-and-Works-with-Source-Codes
PhD-Guidance-and-Works-with-Source-CodesPhD-Guidance-and-Works-with-Source-Codes
PhD-Guidance-and-Works-with-Source-Codes
 
M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
Network Simulation for Master Thesis
Network Simulation for Master ThesisNetwork Simulation for Master Thesis
Network Simulation for Master Thesis
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Rajendra Cv
Rajendra CvRajendra Cv
Rajendra Cv
 
Network Security IEEE 2015 Projects
Network Security IEEE 2015 ProjectsNetwork Security IEEE 2015 Projects
Network Security IEEE 2015 Projects
 
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
Identity Based Detection of Spoofing Attackers in Wireless Networks and Pract...
 
Pro Viva Emmanuel
Pro Viva EmmanuelPro Viva Emmanuel
Pro Viva Emmanuel
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
Mac layer selfish misbehavior in ieee 802.11 ad hoc networks detection and de...
 
Resume
ResumeResume
Resume
 
Dn36682688
Dn36682688Dn36682688
Dn36682688
 
Samir_Tazarine_Resume3
Samir_Tazarine_Resume3Samir_Tazarine_Resume3
Samir_Tazarine_Resume3
 

Similar to Saransh_Burman_Resume (20)

main_phase1 _3.pptx
main_phase1 _3.pptxmain_phase1 _3.pptx
main_phase1 _3.pptx
 
Resume
ResumeResume
Resume
 
Naveen Narasimhaiah resume
Naveen Narasimhaiah resumeNaveen Narasimhaiah resume
Naveen Narasimhaiah resume
 
rajesh resume edit
rajesh resume editrajesh resume edit
rajesh resume edit
 
resume
resumeresume
resume
 
Kasturi_Puramwar
Kasturi_Puramwar Kasturi_Puramwar
Kasturi_Puramwar
 
HARIS NCSU_Resume
HARIS NCSU_ResumeHARIS NCSU_Resume
HARIS NCSU_Resume
 
VS_resume
VS_resumeVS_resume
VS_resume
 
Resume
ResumeResume
Resume
 
Phanidhar Gorrepati
Phanidhar GorrepatiPhanidhar Gorrepati
Phanidhar Gorrepati
 
Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...Design and performance evaluation of a campus network based on routing protoc...
Design and performance evaluation of a campus network based on routing protoc...
 
Sreekanth_CV_1
Sreekanth_CV_1Sreekanth_CV_1
Sreekanth_CV_1
 
Resume-Sarthak P Shetty
Resume-Sarthak P ShettyResume-Sarthak P Shetty
Resume-Sarthak P Shetty
 
Resume
ResumeResume
Resume
 
Vishal_Nigam_EXP_CV_New
Vishal_Nigam_EXP_CV_NewVishal_Nigam_EXP_CV_New
Vishal_Nigam_EXP_CV_New
 
Sunil Resume
Sunil ResumeSunil Resume
Sunil Resume
 
ApoorvJoshi_Resume
ApoorvJoshi_ResumeApoorvJoshi_Resume
ApoorvJoshi_Resume
 
Pallavi's Resume
Pallavi's ResumePallavi's Resume
Pallavi's Resume
 
Mansoor Nasir Cv (2)
Mansoor Nasir Cv (2)Mansoor Nasir Cv (2)
Mansoor Nasir Cv (2)
 
Revanth Vemulapalli_pdf
Revanth Vemulapalli_pdfRevanth Vemulapalli_pdf
Revanth Vemulapalli_pdf
 

Saransh_Burman_Resume

  • 1. Saransh Raj Burman 201 South 4th Street, Apt # 735, San Jose, CA, 95112 | 818-943-7775 | saransh.burman@sjsu.edu Objective: Electrical Engineering Graduate from SJSU, experience in networking and wireless domain seeking Full time/Co-op opportunity, Available Immediately. Education San Jose State University (August 2014-May 2016) Master of Science in Electrical Engineering (GPA-3.56/4) Maharshi Dayanand University, India (August 2008-May 2012) Bachelor of Technology in Electrical Engineering (GPA- 3.77/4) Technical Skills Certifications: CCNA: Cisco Certified Network Associate (Routing and Switching) # CSCO12993123 Languages: C, C++, Python, UNIX, LINUX Networking : TCP/IP, UDP, BGP, OSPF, RIP, ARP, DHCP, DNS, SIP, H.323, MPLS, SDN, VLAN, VPN, STP, SNMP, Virtualization Concepts: Wi-Fi, 802.11(n/ac) routers, Cisco Networking/routers, OSI Model, Telnet, switching, PJSIP, Firewall, BT, Zigbee Tools: GNS3, Wireshark, Putty, VMware, PyCharm, X-lite, Iperf, Ixia Chariot, RvR, TeraTerm, Cygwin, Kiwi syslog Security and Testing: Penetration testing, Cryptography (AES, DES, RSA), Metasploit, IDS/IPS, IPSec, Ettercap Experience Broadcom Limited (August 2015-May 2016) Designation: Wireless Network Intern  Debugging, Configuring, and Testing Routers at AP (802.11n/ac) and WLAN Stations.  Testing of dual/Tri band Wi-Fi routers and Access points at different RF levels (2.4G and 5G) and environments like Range versus Rate (RVR) and Over the Air (OTA) performance evaluation in terms of Throughput and Bandwidth Utilization.  Configuring, implementing and debugging Multi user-MIMO technology, Band steering and 160 MHZ channel.  Planning, Designing and Implementing LAN, WLAN environments, including configuration development, based on design schematics of routers and debug customer related problems. Allied Moulded Enclosure Products India Pvt. Ltd. (September 2012-April 2014) Designation: Business Development Executive  Design, Implement and Drive strategies for sales and marketing for the success of India business.  Research and develop plans which identify marketing opportunities and new project development. Academic Project Centralized Network Monitoring and Management  Created a network in GNS3 and divided it into three parts monitored and managed by three different network administrator.  Configured OSPF, SNMP and Syslog to send all the network information to database and from database to the GUI created.  Alerts for the network were sent as notifications to GUI for network administrator to troubleshoot and manage the network. VoIP Call using PJSIP  Successfully implemented SIP protocol using PJSIP libraries and developed a client side application exchanging media between three clients via SIP proxy server in an Ad-hoc network Throughput Analysis in different environments  Observed the effect on throughput with changing conditions and parameters by setting up test environments.  Performed the test with real hardware: 2.4G vs 5G frequency spectrum, UDP vs TCP and OTA vs Conducted box. DNS Hijacking implementation and Man in the Middle attack (MITM) attack defense mechanism  Simulated DNS hijacking and MITM attack on Deterlab with ARP spoofing, Gained hands on experience with security attacks and defenses. Successfully compared and evaluated security-related algorithms, protocols and solutions.  Language used: LINUX Simulation of label switching networks (MPLS) using NS3 tool  Successfully Simulated a Label-switched network topology through NS3 simulation tool and MPLS module. The project implemented a C++ program to enable label switching from Ingress to Egress of a defined topology. Global Network Design using cisco packet tracer  Led a team of 5 members and successfully designed, configured and implemented a secure network from the Internet Service Provider (ISP) perspective for an organization located in three different countries using Cisco Packet Tracer. Implemented: Spanning tree protocol (STP), Virtual local area network (VLAN), VLAN Trunking protocol (VTP), Border gateway protocol (BGP), Static routing, Network address translation (NAT) and Port security. Setting up Hacking Lab and performing Penetration Testing Conducted various experiments demonstrating exploitation techniques and mitigations using setups on DeterLab  ARP poisoning MITM attack followed by DNS spoofing using Ettercap.  Vulnerability analysis using Nessus and Port stealing & Mac-flooding attacks in switches.