Kasturi Umakant Puramwar is seeking an internship in networking or information security. She has a Master's degree in Electrical Engineering with a focus on networking from San Jose State University and a Bachelor's degree in Electronics and Telecommunications from the University of Mumbai. She has work experience as an information security intern at Equinix where she performed security operations and tasks. She also has experience as a teaching assistant conducting networking labs at San Jose State University. Her technical skills include networking protocols, programming languages, operating systems, and networking tools. She has completed academic projects involving software defined storage, BGP prefix hijacking, analyzing honeypot networks, wireless networking simulations, and more.
1. KASTURI UMAKANT PURAMWAR
Email: puramwarkasturi@gmail.com LinkedIn: https://www.linkedin.com/in/kasturipuramwar Cell No. +1 (408) 667 1671
OBJECTIVE: Actively seeking an Internship in field of networking/information-security.
EDUCATION:
Master of Science in Electrical Engineering (Networking). AUG 2017
San Jose State University, San Jose, CA GPA:3.6
(Internetworking, Network Security, Software Defined Data Centers, Wireless & Mobile networking, Broadband Communication)
Bachelor of Engineering, Electronic & Telecommunications JUNE2014
University of Mumbai, India GPA:3.25
(Computer Communication N/W, Optical Fiber Communication, Wireless Communication)
WORK EXPERIENCE:
Equinix (@ ProUnlimited) – Information Security Intern JUN 2016 – AUG 2016
Performed day to day Information Security operations and tasks on Global Information Security projects which included 2-
Factor Authentication, Intrusion Detection Systems, Vulnerability Management, and user support.
Worked in firewall operation support which included managing firewall rules using PaloAlto firewalls. Configuring the firewall
for an enterprise network. Handled load balancing operations using the f5 load balancers.
Performed web application scanning and host scanning for vulnerability management. Assist in Information security policy
publishing by approving the policies before publishing. Wrote Quick start guides for Web application scanning and how to
create a v-wire. Also wrote a bash script for database backup from one server to other.
Teaching Assistant - San Jose State University AUG 2016 – DEC 2016
Conduct labs using Matlab, LTspice, and Ipython to solve realistic continuous and discrete time signals, circuits and systems
problems. Application to passive and active circuits, to basic control, communications
TECHNICAL SKILLS:
Software tools: PSPICE, MATLAB, Artwork PCB, SPJ stimulator, KEIL, Turbo C, Flash Magic, Microsoft Office, Nessus, Splunk,
Websense.
Programming languages: Python, ASSEMBLY Language.
Operating Systems: Linux, Windows, Mac, Backtrack Linux, Metasploitable, Kali Linux.
Networking Protocols and Technologies: TCP/IP, UDP, HTTP, ARP, BGP, OSPF, VLAN, DHCP, MPLS, VPN, Wi-Fi, Bluetooth,
LTE, 3G/4G, ISIS, RIP, FTP, SNMP, SDN, 802.11, DSR, AODV, DSDV, SSL, IPsec
Networking Tools: Wireshark, Cisco Packet Tracer, NS3, NS2.
Transferable skills: Computing skills, Troubleshooting, Promoting Change, Goal Setting, Problem solving, Public Relations,
Improving, Conceptualizing, visualizing concepts, Clarifying problems, Researching.
ACADEMIC PROJECTS:
Software Defined storage
Used NexentaStor to manage NAS/SAN based primary deployments by creating a Nexentastor environment to create and
manage virtual and physical storage devices. Created several volumes and managed those volumes. Created NFS-Share, CIFS
share folders and changed their default values and properties, configured CIFS and mounted NFS-share over NS instance.
BGP Prefix Hijacking MAY 2016
Implemented a BGP topology using the quagga software routing suite. In prefix hijacking, hijacked a BGP prefix advertised by
a router by altering it by another prefix address so that announcement gets directed towards prefix owner. Prefix Hijacking is
implemented in a test bed environment provided by Deter labs.
Analyzing Honeypot Network (MHN) and Implementing a virtual honeypot MAY 2016
Deployed a Honeypot and analyzed the origin, types, frequency, & IP spoofing of the attacks on the honeypot. We firstly
deployed a honeypot using MHN to detect what kind of attacks system is vulnerable to and then made our own virtual honeypot
and configured it to trace intruders. Also analyzed honeypots such as Snort, Suricata, Wordpot, Shockpot.
Performance analysis of Ad hoc routing protocols MAY 2016
Generated and Analyzed the trace files for AD HOC routing protocols (AODV, DSR, DSDV) using NS2 for various scenarios.
Designed python script for creating the traces and developed a parser script in python for calculation of various parameters.
Implementation of VLAN’s using open vSwitch MAR 2016
Implemented VLANs within a virtualized network. This is done through an Open vSwitch (OVS) that provides the required
virtualization by creating virtual instance of a switch. Multiple hosts can then be attached to the switch.
802.11 Implementation in NS-2 MAR 2016
Analyzed the wireless-simple-mac tcl file & calculated various parameters for several scenarios such as Network traffic, Network
throughput from the traces generated for Simple MAC, 802.11 MAC. Analysis of the trace file was done using awk script.
Network Security and Hacking FEB 2016
Exploited Windows XP machine launching exploits from Metasploitable Linux, Telnet password sniffing & password cracking
using John the Ripper, Used Armitage to automate vulnerability scan & exploit, Simulated SQL Injection, ARP & DNS Spoofing,
Web MITM & Buffer overflow Attacks.
Simulation of Label Switching Network using NS3 tool. FEB 2016
Implemented and stimulated a network on NS3 tool the using MPLS protocol to show swapping of labels amongst the LSR’s
present in the network.
Implementation of DHCP, DNS, Web Server and Firewall on LINUX NOV 2015
Designed and implemented a small network by implementing DNS, DHCP, WEBSERVER and FIREWALL on LINUX.