SlideShare a Scribd company logo
1 of 2
SANTOSH R
Vijayawada, Krishna DT | santhoshpraveen72@gmail.com | +91 8523856965
PROFILE SUMMARY:
• Having 1+ years of experience in System Administration.
• User administration (setup and maintaining account)
• Maintaining system
• Verify that peripherals are working properly
• Quickly arrange repair for hardware in occasion of hardware failure
• Monitor system performance
• Create file systems
• Install software
• Create a backup and recovery policy
• Monitor network communication
• Update system as soon as new version of OS and application software comes out
• Implement the policies for the use of the computer system and network
• Setup security policies for users. A sysadmin must have a strong grasp of computer security
(e.g. firewalls and intrusion detection systems)
• Documentation in form of internal wiki
• Password and identity management
• Providing support on 24*7 shift basis.
Education
• B.Tech (CSE) from JNTU Kakinada University in 2014
TechnologySummary
• Red Hat Enterprise Linux, Windows
• MySQL, DB2 DBA V 9.7 LUW
• Avira Antivirus, Bit defender, Microsoft Security Essentials, Avast, Microsoft Defender.
ProfessionalExperience:
• Worked with Cecilion Technologies as System Administrator from November 2014 to December
2015, Hyderabad.
• Presently working with Manyata IT Pvt Ltd.as System Administrator from January 2016 to till date
Responsibilities in CecilionTechnologies:
• Provided systems administration support for UNIX systems including server and workstation
upgrades, backup and disaster recovery monitoring, user account setup and security
administration.
• Performed regular system backups and recovery procedures.
• Helped resolve virus outbreak as member of a team that quickly isolated and removed virus
that had infiltrated systems.
• Monitored night-batch job process, documented errors, performed nightly backups and
troubleshot issues.
Responsibilities in Manyata IT Pvt Ltd:
• Performed regular system backups and recovery procedures.
• To provide authentications to users in both Linux and windows server systems.
• To check whether the networks problem raised and maintain correct bandwidth, to resolve
the problem if raised.
• To maintain a clean and good relationship with the business that our company holds.
• To block the unwanted sites.
• To create new users and change the password if needed.
• To install the licensed software’s by network boot.
Declaration:
I hereby declare that the above mentioned details are correct to the best of my knowledge.
Place
Date:
Santosh Praveen R

More Related Content

What's hot

Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426Todd Deshane
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Windows, Windows Everywhere! Windows Mass Management Made Easy.
Windows, Windows Everywhere! Windows Mass Management Made Easy.Windows, Windows Everywhere! Windows Mass Management Made Easy.
Windows, Windows Everywhere! Windows Mass Management Made Easy.Jane Grafton
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Operating System Security
Operating System SecurityOperating System Security
Operating System SecurityRamesh Upadhaya
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)richbryansalvo
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}richbryansalvo
 
Quickbook adv2 new
Quickbook  adv2 new Quickbook  adv2 new
Quickbook adv2 new Step 991
 
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability AssessmentTALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability AssessmentDawn Yankeelov
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
Lec 2 introduction to the internet security
Lec 2 introduction to the internet securityLec 2 introduction to the internet security
Lec 2 introduction to the internet securityKewan Suliman
 
Identity Security - Azure Identity Protection
Identity Security - Azure Identity ProtectionIdentity Security - Azure Identity Protection
Identity Security - Azure Identity ProtectionEng Teong Cheah
 

What's hot (20)

Cs seminar 20070426
Cs seminar 20070426Cs seminar 20070426
Cs seminar 20070426
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Network security
Network securityNetwork security
Network security
 
Windows, Windows Everywhere! Windows Mass Management Made Easy.
Windows, Windows Everywhere! Windows Mass Management Made Easy.Windows, Windows Everywhere! Windows Mass Management Made Easy.
Windows, Windows Everywhere! Windows Mass Management Made Easy.
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Network Security Goals
Network Security GoalsNetwork Security Goals
Network Security Goals
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
System security
System securitySystem security
System security
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}
 
Quickbook adv2 new
Quickbook  adv2 new Quickbook  adv2 new
Quickbook adv2 new
 
Security
SecuritySecurity
Security
 
Network security
Network securityNetwork security
Network security
 
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability AssessmentTALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
TALK Cybersecurity Summit 2017 Slides: Chris Goggans on Vulnerability Assessment
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Lec 2 introduction to the internet security
Lec 2 introduction to the internet securityLec 2 introduction to the internet security
Lec 2 introduction to the internet security
 
Network security
Network securityNetwork security
Network security
 
Identity Security - Azure Identity Protection
Identity Security - Azure Identity ProtectionIdentity Security - Azure Identity Protection
Identity Security - Azure Identity Protection
 

Similar to SANTOSH RESUME

Similar to SANTOSH RESUME (20)

Knowedge Skills Ability
Knowedge Skills AbilityKnowedge Skills Ability
Knowedge Skills Ability
 
Resume_feb15
Resume_feb15Resume_feb15
Resume_feb15
 
Alex R Brown Resume
Alex R Brown ResumeAlex R Brown Resume
Alex R Brown Resume
 
System Administrator
System AdministratorSystem Administrator
System Administrator
 
Resume-John-Whitney
Resume-John-WhitneyResume-John-Whitney
Resume-John-Whitney
 
Frank Johnston resume
Frank Johnston resumeFrank Johnston resume
Frank Johnston resume
 
VISHAL CURRICULUM VITAE
VISHAL CURRICULUM VITAEVISHAL CURRICULUM VITAE
VISHAL CURRICULUM VITAE
 
Latest_Rahul_Resume
Latest_Rahul_ResumeLatest_Rahul_Resume
Latest_Rahul_Resume
 
Resume_Manjunath
Resume_ManjunathResume_Manjunath
Resume_Manjunath
 
Resume
ResumeResume
Resume
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #3
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
 
rajekaru1
rajekaru1rajekaru1
rajekaru1
 
System administrator (it)
System administrator (it)System administrator (it)
System administrator (it)
 
Manikandan-Palanisamy
Manikandan-PalanisamyManikandan-Palanisamy
Manikandan-Palanisamy
 
Logesh Resume
Logesh ResumeLogesh Resume
Logesh Resume
 
vijay kumar adiveni
vijay kumar adivenivijay kumar adiveni
vijay kumar adiveni
 
IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant IT_Security_Service Delivery_Consultant
IT_Security_Service Delivery_Consultant
 
SURYAMANI
SURYAMANISURYAMANI
SURYAMANI
 
Resume
ResumeResume
Resume
 
Prashanth kumarResume(1)
Prashanth kumarResume(1)Prashanth kumarResume(1)
Prashanth kumarResume(1)
 

SANTOSH RESUME

  • 1. SANTOSH R Vijayawada, Krishna DT | santhoshpraveen72@gmail.com | +91 8523856965 PROFILE SUMMARY: • Having 1+ years of experience in System Administration. • User administration (setup and maintaining account) • Maintaining system • Verify that peripherals are working properly • Quickly arrange repair for hardware in occasion of hardware failure • Monitor system performance • Create file systems • Install software • Create a backup and recovery policy • Monitor network communication • Update system as soon as new version of OS and application software comes out • Implement the policies for the use of the computer system and network • Setup security policies for users. A sysadmin must have a strong grasp of computer security (e.g. firewalls and intrusion detection systems) • Documentation in form of internal wiki • Password and identity management • Providing support on 24*7 shift basis. Education • B.Tech (CSE) from JNTU Kakinada University in 2014 TechnologySummary • Red Hat Enterprise Linux, Windows • MySQL, DB2 DBA V 9.7 LUW • Avira Antivirus, Bit defender, Microsoft Security Essentials, Avast, Microsoft Defender.
  • 2. ProfessionalExperience: • Worked with Cecilion Technologies as System Administrator from November 2014 to December 2015, Hyderabad. • Presently working with Manyata IT Pvt Ltd.as System Administrator from January 2016 to till date Responsibilities in CecilionTechnologies: • Provided systems administration support for UNIX systems including server and workstation upgrades, backup and disaster recovery monitoring, user account setup and security administration. • Performed regular system backups and recovery procedures. • Helped resolve virus outbreak as member of a team that quickly isolated and removed virus that had infiltrated systems. • Monitored night-batch job process, documented errors, performed nightly backups and troubleshot issues. Responsibilities in Manyata IT Pvt Ltd: • Performed regular system backups and recovery procedures. • To provide authentications to users in both Linux and windows server systems. • To check whether the networks problem raised and maintain correct bandwidth, to resolve the problem if raised. • To maintain a clean and good relationship with the business that our company holds. • To block the unwanted sites. • To create new users and change the password if needed. • To install the licensed software’s by network boot. Declaration: I hereby declare that the above mentioned details are correct to the best of my knowledge. Place Date: Santosh Praveen R