1. Saransh Raj Burman
201 South 4th Street, Apt # 735, San Jose, CA, 95112 | 818-943-7775 | saransh.burman@sjsu.edu
Objective: Electrical Engineering Graduate from SJSU, experience in networking and wireless domain seeking Full time/Co-op
opportunity, Available Immediately.
Education
San Jose State University (August 2014-May 2016)
Master of Science in Electrical Engineering (GPA-3.56/4)
Maharshi Dayanand University, India (August 2008-May 2012)
Bachelor of Technology in Electrical Engineering (GPA- 3.77/4)
Technical Skills
Certifications: CCNA: Cisco Certified Network Associate (Routing and Switching) # CSCO12993123
Languages: C, C++, Python, UNIX, LINUX
Networking : TCP/IP, UDP, BGP, OSPF, RIP, ARP, DHCP, DNS, SIP, H.323, MPLS, SDN, VLAN, VPN, STP, SNMP, Virtualization
Concepts: Wi-Fi, 802.11(n/ac) routers, Cisco Networking/routers, OSI Model, Telnet, switching, PJSIP, Firewall, BT, Zigbee
Tools: GNS3, Wireshark, Putty, VMware, PyCharm, X-lite, Iperf, Ixia Chariot, RvR, TeraTerm, Cygwin, Kiwi syslog
Security and Testing: Penetration testing, Cryptography (AES, DES, RSA), Metasploit, IDS/IPS, IPSec, Ettercap
Experience
Broadcom Limited (August 2015-May 2016)
Designation: Wireless Network Intern
Debugging, Configuring, and Testing Routers at AP (802.11n/ac) and WLAN Stations.
Testing of dual/Tri band Wi-Fi routers and Access points at different RF levels (2.4G and 5G) and environments like Range
versus Rate (RVR) and Over the Air (OTA) performance evaluation in terms of Throughput and Bandwidth Utilization.
Configuring, implementing and debugging Multi user-MIMO technology, Band steering and 160 MHZ channel.
Planning, Designing and Implementing LAN, WLAN environments, including configuration development, based on design
schematics of routers and debug customer related problems.
Allied Moulded Enclosure Products India Pvt. Ltd. (September 2012-April 2014)
Designation: Business Development Executive
Design, Implement and Drive strategies for sales and marketing for the success of India business.
Research and develop plans which identify marketing opportunities and new project development.
Academic Project
Centralized Network Monitoring and Management
Created a network in GNS3 and divided it into three parts monitored and managed by three different network administrator.
Configured OSPF, SNMP and Syslog to send all the network information to database and from database to the GUI created.
Alerts for the network were sent as notifications to GUI for network administrator to troubleshoot and manage the network.
VoIP Call using PJSIP
Successfully implemented SIP protocol using PJSIP libraries and developed a client side application exchanging media
between three clients via SIP proxy server in an Ad-hoc network
Throughput Analysis in different environments
Observed the effect on throughput with changing conditions and parameters by setting up test environments.
Performed the test with real hardware: 2.4G vs 5G frequency spectrum, UDP vs TCP and OTA vs Conducted box.
DNS Hijacking implementation and Man in the Middle attack (MITM) attack defense mechanism
Simulated DNS hijacking and MITM attack on Deterlab with ARP spoofing, Gained hands on experience with security attacks
and defenses. Successfully compared and evaluated security-related algorithms, protocols and solutions.
Language used: LINUX
Simulation of label switching networks (MPLS) using NS3 tool
Successfully Simulated a Label-switched network topology through NS3 simulation tool and MPLS module. The project
implemented a C++ program to enable label switching from Ingress to Egress of a defined topology.
Global Network Design using cisco packet tracer
Led a team of 5 members and successfully designed, configured and implemented a secure network from the Internet Service
Provider (ISP) perspective for an organization located in three different countries using Cisco Packet Tracer. Implemented:
Spanning tree protocol (STP), Virtual local area network (VLAN), VLAN Trunking protocol (VTP), Border gateway protocol
(BGP), Static routing, Network address translation (NAT) and Port security.
Setting up Hacking Lab and performing Penetration Testing
Conducted various experiments demonstrating exploitation techniques and mitigations using setups on DeterLab
ARP poisoning MITM attack followed by DNS spoofing using Ettercap.
Vulnerability analysis using Nessus and Port stealing & Mac-flooding attacks in switches.