SlideShare a Scribd company logo
1 of 1
Download to read offline
Daniel J. Mercado
4053 Nathaniel Rochester Hall
Rochester NY 14623
(845) 645-1010
djm2095@rit.edu
www.linkedin.com/in/albinohat
Objective: A full-time co-op position as a software tester or software engineer
Education: Rochester Institute of Technology, Rochester, New York
Bachelor of Science in Information Security and Forensics, Anticipated Graduation
December 2015 GPA 3.66 / Dean's List: 6 Quarters
Coursework: System Administration: Set-up Windows 2008 DCs and administered small
AD domains. Set up group policy and adhered to server & web security
standards. Installed and configured Samba 4 and iSCSI(Starwind)
Introduction to Routing & Switching: Configured STP, RIP, VLANs &
ACLs on Cisco hardware.
Cryptography & Authentication: Performed cryptanalysis using Cryptool
to break ROT-13, Vigenère and simple substitution ciphers.
Network Services: Setup and configured DHCP, DNS & SMTP
Servers and clients on Windows as well as Linux platforms.
Windows Systems Forensics: Worked on an open-
source project to retrieve and summarize artifacts from a Windows system.
Information Security Policies: Created policies for a business and
presented them in a professional manner.
Skills: General: Written/Oral Communications, Groupwork
Scripting Languages: Perl, Python
OS: Windows XP/7/8/2003/2008/2012, CentOS 5.6/6.2, RHEL 6, Kali 1.0.9
Software: VMware, VirtualBox Wireshark, Omnipeek, Cryptool
Hardware: Cisco 1242AG/2621/2651/2811/3550
Activities: RIT Competitive Cybersecurity Club (RC3) member
Work Experience: Functionality Test Engineer Intern (1 Year). Responsibilities included
working with developers to fix issues in software and maintain testing environments.
References: Available upon request

More Related Content

What's hot

Rise of software supply chain attack
Rise of software supply chain attackRise of software supply chain attack
Rise of software supply chain attackYadnyawalkya Tale
 
Network Security Practices-Authentication application
Network Security Practices-Authentication applicationNetwork Security Practices-Authentication application
Network Security Practices-Authentication applicationGayathridevi120
 
Sigfree ppt (International Journal of Computer Science and Mobile Computing)
Sigfree ppt (International Journal of Computer Science and Mobile Computing)Sigfree ppt (International Journal of Computer Science and Mobile Computing)
Sigfree ppt (International Journal of Computer Science and Mobile Computing)Student
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DevicePriyanka Aash
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityEryk Budi Pratama
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
Cybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityCybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityEryk Budi Pratama
 

What's hot (8)

Rise of software supply chain attack
Rise of software supply chain attackRise of software supply chain attack
Rise of software supply chain attack
 
Network Security Practices-Authentication application
Network Security Practices-Authentication applicationNetwork Security Practices-Authentication application
Network Security Practices-Authentication application
 
Sigfree ppt (International Journal of Computer Science and Mobile Computing)
Sigfree ppt (International Journal of Computer Science and Mobile Computing)Sigfree ppt (International Journal of Computer Science and Mobile Computing)
Sigfree ppt (International Journal of Computer Science and Mobile Computing)
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Profile-Arvind
Profile-ArvindProfile-Arvind
Profile-Arvind
 
Cybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityCybersecurity - Mobile Application Security
Cybersecurity - Mobile Application Security
 

Viewers also liked

The Human Truths Behind Consumer Behaviour
The Human Truths Behind Consumer BehaviourThe Human Truths Behind Consumer Behaviour
The Human Truths Behind Consumer BehaviourXPotential
 
Introduction to Consumer Behaviour
Introduction to Consumer BehaviourIntroduction to Consumer Behaviour
Introduction to Consumer BehaviourMoses Gomes
 
consumer-behavior-ppt
consumer-behavior-pptconsumer-behavior-ppt
consumer-behavior-pptH9460730008
 
Consumer Behavior
Consumer BehaviorConsumer Behavior
Consumer BehaviorMorisha Roy
 
Consumer Behaviour
Consumer BehaviourConsumer Behaviour
Consumer BehaviourArjun Ramesh
 
Models of consumer behaviour
Models of consumer behaviourModels of consumer behaviour
Models of consumer behaviourVikram g b
 

Viewers also liked (10)

Consumer psychology
Consumer psychologyConsumer psychology
Consumer psychology
 
Consumer Behavior
Consumer BehaviorConsumer Behavior
Consumer Behavior
 
The Human Truths Behind Consumer Behaviour
The Human Truths Behind Consumer BehaviourThe Human Truths Behind Consumer Behaviour
The Human Truths Behind Consumer Behaviour
 
Theories of Consumer Behavior
Theories of  Consumer  BehaviorTheories of  Consumer  Behavior
Theories of Consumer Behavior
 
Introduction to Consumer Behaviour
Introduction to Consumer BehaviourIntroduction to Consumer Behaviour
Introduction to Consumer Behaviour
 
consumer-behavior-ppt
consumer-behavior-pptconsumer-behavior-ppt
consumer-behavior-ppt
 
Consumer Behavior
Consumer BehaviorConsumer Behavior
Consumer Behavior
 
Theory Of Consumer Behavior
Theory Of Consumer BehaviorTheory Of Consumer Behavior
Theory Of Consumer Behavior
 
Consumer Behaviour
Consumer BehaviourConsumer Behaviour
Consumer Behaviour
 
Models of consumer behaviour
Models of consumer behaviourModels of consumer behaviour
Models of consumer behaviour
 

Similar to Daniel Mercado Resume_03_2015

Brian_Starr_Resume
Brian_Starr_ResumeBrian_Starr_Resume
Brian_Starr_ResumeBrian Starr
 
Eric J Geer Resume 05-20-2015
Eric J Geer Resume 05-20-2015Eric J Geer Resume 05-20-2015
Eric J Geer Resume 05-20-2015Eric Geer
 
Ben Hay CV External - 14.02.15
Ben Hay CV External - 14.02.15Ben Hay CV External - 14.02.15
Ben Hay CV External - 14.02.15Ben Hay
 
Assignment ContentResourcesThe Sample PowerPoint.docx
Assignment ContentResourcesThe Sample PowerPoint.docxAssignment ContentResourcesThe Sample PowerPoint.docx
Assignment ContentResourcesThe Sample PowerPoint.docxelinoraudley582231
 
Malik it eng 7 years exp
Malik it eng 7 years expMalik it eng 7 years exp
Malik it eng 7 years expAbdul Malik
 
Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)Md Sohrab khan
 
Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Ifthekharul Islam
 
Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1Mark Koehler
 
Syed Aman Hussain Updated Cv
Syed Aman Hussain Updated CvSyed Aman Hussain Updated Cv
Syed Aman Hussain Updated Cvsdamanhussain
 
Amit_Purbi_Resume
Amit_Purbi_ResumeAmit_Purbi_Resume
Amit_Purbi_ResumeAmit Purbi
 
Resume of md. abu jafar
Resume of md. abu jafarResume of md. abu jafar
Resume of md. abu jafarAbu Jafar
 

Similar to Daniel Mercado Resume_03_2015 (20)

Brian_Starr_Resume
Brian_Starr_ResumeBrian_Starr_Resume
Brian_Starr_Resume
 
Eric J Geer Resume 05-20-2015
Eric J Geer Resume 05-20-2015Eric J Geer Resume 05-20-2015
Eric J Geer Resume 05-20-2015
 
NISHAD
NISHADNISHAD
NISHAD
 
Ron.glenn
Ron.glennRon.glenn
Ron.glenn
 
Resume
ResumeResume
Resume
 
Ben Hay CV External - 14.02.15
Ben Hay CV External - 14.02.15Ben Hay CV External - 14.02.15
Ben Hay CV External - 14.02.15
 
Resume
ResumeResume
Resume
 
Assignment ContentResourcesThe Sample PowerPoint.docx
Assignment ContentResourcesThe Sample PowerPoint.docxAssignment ContentResourcesThe Sample PowerPoint.docx
Assignment ContentResourcesThe Sample PowerPoint.docx
 
Malik it eng 7 years exp
Malik it eng 7 years expMalik it eng 7 years exp
Malik it eng 7 years exp
 
Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)
 
New Resume
New ResumeNew Resume
New Resume
 
CV Ramez
CV Ramez CV Ramez
CV Ramez
 
Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5
 
Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1Mark_Koehler_Resume_JUN2015_v1.1
Mark_Koehler_Resume_JUN2015_v1.1
 
M-asif's CV
M-asif's CVM-asif's CV
M-asif's CV
 
KoryTWright Resume
KoryTWright ResumeKoryTWright Resume
KoryTWright Resume
 
Syed Aman Hussain Updated Cv
Syed Aman Hussain Updated CvSyed Aman Hussain Updated Cv
Syed Aman Hussain Updated Cv
 
AndrianinaSystemNetworkAdmin
AndrianinaSystemNetworkAdminAndrianinaSystemNetworkAdmin
AndrianinaSystemNetworkAdmin
 
Amit_Purbi_Resume
Amit_Purbi_ResumeAmit_Purbi_Resume
Amit_Purbi_Resume
 
Resume of md. abu jafar
Resume of md. abu jafarResume of md. abu jafar
Resume of md. abu jafar
 

Daniel Mercado Resume_03_2015

  • 1. Daniel J. Mercado 4053 Nathaniel Rochester Hall Rochester NY 14623 (845) 645-1010 djm2095@rit.edu www.linkedin.com/in/albinohat Objective: A full-time co-op position as a software tester or software engineer Education: Rochester Institute of Technology, Rochester, New York Bachelor of Science in Information Security and Forensics, Anticipated Graduation December 2015 GPA 3.66 / Dean's List: 6 Quarters Coursework: System Administration: Set-up Windows 2008 DCs and administered small AD domains. Set up group policy and adhered to server & web security standards. Installed and configured Samba 4 and iSCSI(Starwind) Introduction to Routing & Switching: Configured STP, RIP, VLANs & ACLs on Cisco hardware. Cryptography & Authentication: Performed cryptanalysis using Cryptool to break ROT-13, Vigenère and simple substitution ciphers. Network Services: Setup and configured DHCP, DNS & SMTP Servers and clients on Windows as well as Linux platforms. Windows Systems Forensics: Worked on an open- source project to retrieve and summarize artifacts from a Windows system. Information Security Policies: Created policies for a business and presented them in a professional manner. Skills: General: Written/Oral Communications, Groupwork Scripting Languages: Perl, Python OS: Windows XP/7/8/2003/2008/2012, CentOS 5.6/6.2, RHEL 6, Kali 1.0.9 Software: VMware, VirtualBox Wireshark, Omnipeek, Cryptool Hardware: Cisco 1242AG/2621/2651/2811/3550 Activities: RIT Competitive Cybersecurity Club (RC3) member Work Experience: Functionality Test Engineer Intern (1 Year). Responsibilities included working with developers to fix issues in software and maintain testing environments. References: Available upon request