- Accomplished project management professional with over 12 years of experience managing security projects including airport security screening systems, CCTV systems, and access control systems.
- Currently a Security Systems Administration Officer at Hamad International Airport, where responsibilities include overseeing security operations, managing projects, and maintaining systems.
- Skilled in all phases of project management, technical support, system installation and maintenance, troubleshooting, and developing documentation.
- Kaustubh Sanjay Kothiwan is a Project Management professional with over 13 years of experience managing security projects in airports.
- He is currently working as a Security Systems Administration Officer at Hamad International Airport in Doha, Qatar.
- Prior to this role, he held positions managing IT, security systems, and airport security screening equipment projects.
#Course description
Critical Infrastructure Protection (CIP) NERC training course will show you the CIP measures created by Federal Energy Regulatory Commission (FERC) and North American Electric Reliability Corporation (NERC) and will assist you with understanding the prerequisites for work force and training, physical security of Bulk Electric Systems (BES) cybersecurity and data protection.
NERC is resolved to ensure the BES against cybersecurity bargains prompting unsteadiness. Another progress started in 2014 with a specific end goal to move from CIP variant 3 guidelines to CIP rendition 5. The objective is to enhance the specialized security necessities for BES and desires for consistence and requirement.
#Audience
Critical Infrastructure Protection (CIP) NERC training is a 2-day course designed for:
IT and ICS cybersecurity personnel
Field support personnel and security operators
Auditors, vendors and team leaders
All individuals who need to understand the Critical Infrastructure Protection (CIP) NERC concepts
Electric utility engineers working in electric industry security
System personnel worried about NERC standard for system security
System operators and individuals in electric utility organizations
Independent system operator personnel working with utility companies
Electric utility personnel who recently started career involved with Critical Infrastructure Protection (CIP) NERC standards.
Technicians, operators, and maintenance personnel who are or will be working at electric utility companies.
Investors and contractors who plan to make investments in electric industry considering security standards.
Managers, accountants, and executives of electric industry.
#Training Objectives
Understand the new terms and revised definitions of CIP NERC standard
Learn about Cyber asset categories
Apply gap analysis with new standards applications
Recognize the role FERC and NERC on CIP
Determine the requirements to implement strategies for CIP
Apply CIP requirements to balance cybersecurity benefits and regulatory compliances
Understand how the electric sector regulatory structure fit into the reliability standards
Explore BES cyber asset identification to protect grids
Learn about common physical controls and monitoring schemes in CIP
Understand the system security management requirements and compliance challenges
Apply vulnerability assessment for ensuring the stable operation of system
Apply methods in order to identify, classify and response to each incident in CIP
Call us today at +1-972-665-9786. Learn more about this course audience, objectives, outlines, seminars, pricing , any other information. Visit our website link below.
Learn more about Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Building an Intelligence-Driven Security Operations CenterEMC
This white paper describes how an intelligence-driven security operations center (SOC) improves threat detection and response by helping organizations use all available security-related information from both internal and external sources to detect hidden threats and even predict new ones.
Thomas Reinheimer has over 19 years of experience in information security, auditing, and risk management. He has worked for both government agencies and private companies, leading security assessments, audits, and authorization projects. Reinheimer has a unique combination of technical, audit, and accounting skills, and is experienced in frameworks such as NIST 800-53, FedRAMP, and FISMA. He holds multiple professional certifications related to information security, assurance, and management.
3SC World is a company that provides various business services and technology solutions with over 20 years of experience. It offers expertise in areas such as IT, cyber security, banking, supply chain management, and government contracting. The company works with clients across many industries to meet their outsourcing needs on time and within budget.
Skill Set Needed to work successfully in a SOCFuad Khan
This document discusses security operations centers (SOCs) and the roles within them. A SOC is an organization that defends a computer network against unauthorized activity through monitoring, detection, analysis, and response. The document outlines the responsibilities of tier 1, 2, and 3 SOC analysts, with tier 1 observing logs and putting in trouble tickets, tier 2 taking on more research, analysis, and automation, and tier 3 specializing in advanced security areas and serving as expert "hunters". It emphasizes that teamwork is essential for all SOC roles.
Physical Security - Why Your Business Needs ItTerra Verde
This document discusses the importance of physical security (PhySec) programs. It defines PhySec as measures that protect people, property, and assets from harm, unauthorized access, and theft. Effective PhySec deters crimes through deterrence, active monitoring, delaying intruders, responding to incidents, and quick recovery. Sound PhySec programs incorporate many elements like access controls, surveillance, alarms, and response plans. To implement PhySec properly, an organization must understand its threats, vulnerabilities, assets, costs, and business needs. Both overt and covert security measures working together provide the best protection.
Code of practice for physical security systems in banksSamer Al Basha
The document is a draft Indian standard code of practice for physical security systems in banks. It outlines organizational responsibilities for security, including having a security manual and program. It describes location and infrastructure considerations as well as security measures like risk categorization, primary in-built measures, essential general measures, and desirable additional measures. It also provides procedures for opening, closing, and accessing branches after hours. In the event of an incident, branches must immediately report to law enforcement and authorities.
- Kaustubh Sanjay Kothiwan is a Project Management professional with over 13 years of experience managing security projects in airports.
- He is currently working as a Security Systems Administration Officer at Hamad International Airport in Doha, Qatar.
- Prior to this role, he held positions managing IT, security systems, and airport security screening equipment projects.
#Course description
Critical Infrastructure Protection (CIP) NERC training course will show you the CIP measures created by Federal Energy Regulatory Commission (FERC) and North American Electric Reliability Corporation (NERC) and will assist you with understanding the prerequisites for work force and training, physical security of Bulk Electric Systems (BES) cybersecurity and data protection.
NERC is resolved to ensure the BES against cybersecurity bargains prompting unsteadiness. Another progress started in 2014 with a specific end goal to move from CIP variant 3 guidelines to CIP rendition 5. The objective is to enhance the specialized security necessities for BES and desires for consistence and requirement.
#Audience
Critical Infrastructure Protection (CIP) NERC training is a 2-day course designed for:
IT and ICS cybersecurity personnel
Field support personnel and security operators
Auditors, vendors and team leaders
All individuals who need to understand the Critical Infrastructure Protection (CIP) NERC concepts
Electric utility engineers working in electric industry security
System personnel worried about NERC standard for system security
System operators and individuals in electric utility organizations
Independent system operator personnel working with utility companies
Electric utility personnel who recently started career involved with Critical Infrastructure Protection (CIP) NERC standards.
Technicians, operators, and maintenance personnel who are or will be working at electric utility companies.
Investors and contractors who plan to make investments in electric industry considering security standards.
Managers, accountants, and executives of electric industry.
#Training Objectives
Understand the new terms and revised definitions of CIP NERC standard
Learn about Cyber asset categories
Apply gap analysis with new standards applications
Recognize the role FERC and NERC on CIP
Determine the requirements to implement strategies for CIP
Apply CIP requirements to balance cybersecurity benefits and regulatory compliances
Understand how the electric sector regulatory structure fit into the reliability standards
Explore BES cyber asset identification to protect grids
Learn about common physical controls and monitoring schemes in CIP
Understand the system security management requirements and compliance challenges
Apply vulnerability assessment for ensuring the stable operation of system
Apply methods in order to identify, classify and response to each incident in CIP
Call us today at +1-972-665-9786. Learn more about this course audience, objectives, outlines, seminars, pricing , any other information. Visit our website link below.
Learn more about Critical Infrastructure Protection (CIP) NERC Training
https://www.tonex.com/training-courses/critical-infrastructure-protection-cip-nerc-training/
Building an Intelligence-Driven Security Operations CenterEMC
This white paper describes how an intelligence-driven security operations center (SOC) improves threat detection and response by helping organizations use all available security-related information from both internal and external sources to detect hidden threats and even predict new ones.
Thomas Reinheimer has over 19 years of experience in information security, auditing, and risk management. He has worked for both government agencies and private companies, leading security assessments, audits, and authorization projects. Reinheimer has a unique combination of technical, audit, and accounting skills, and is experienced in frameworks such as NIST 800-53, FedRAMP, and FISMA. He holds multiple professional certifications related to information security, assurance, and management.
3SC World is a company that provides various business services and technology solutions with over 20 years of experience. It offers expertise in areas such as IT, cyber security, banking, supply chain management, and government contracting. The company works with clients across many industries to meet their outsourcing needs on time and within budget.
Skill Set Needed to work successfully in a SOCFuad Khan
This document discusses security operations centers (SOCs) and the roles within them. A SOC is an organization that defends a computer network against unauthorized activity through monitoring, detection, analysis, and response. The document outlines the responsibilities of tier 1, 2, and 3 SOC analysts, with tier 1 observing logs and putting in trouble tickets, tier 2 taking on more research, analysis, and automation, and tier 3 specializing in advanced security areas and serving as expert "hunters". It emphasizes that teamwork is essential for all SOC roles.
Physical Security - Why Your Business Needs ItTerra Verde
This document discusses the importance of physical security (PhySec) programs. It defines PhySec as measures that protect people, property, and assets from harm, unauthorized access, and theft. Effective PhySec deters crimes through deterrence, active monitoring, delaying intruders, responding to incidents, and quick recovery. Sound PhySec programs incorporate many elements like access controls, surveillance, alarms, and response plans. To implement PhySec properly, an organization must understand its threats, vulnerabilities, assets, costs, and business needs. Both overt and covert security measures working together provide the best protection.
Code of practice for physical security systems in banksSamer Al Basha
The document is a draft Indian standard code of practice for physical security systems in banks. It outlines organizational responsibilities for security, including having a security manual and program. It describes location and infrastructure considerations as well as security measures like risk categorization, primary in-built measures, essential general measures, and desirable additional measures. It also provides procedures for opening, closing, and accessing branches after hours. In the event of an incident, branches must immediately report to law enforcement and authorities.
The document provides an overview of information security audits from an expert's perspective. It discusses how to prepare for an audit, what to expect during each phase, how to communicate with auditors, and tips for passing the audit, including having proper documentation, controls, policies, and management support. The goal is for the audit to be a learning experience and opportunity to improve the security program rather than a failure.
This document provides information about security operations centers (SOCs). It discusses why organizations build security controls and capabilities like SOCs, which are designed to reduce risk, protect businesses, and move from reactive responses to proactive threat mitigation. The document defines a SOC as a skilled team that follows processes to manage threats and reduce security risk. It outlines the major responsibilities of a SOC, which include monitoring, analyzing, and responding to security events. It also notes that effective SOCs balance people, processes, and technology. The document provides details about building a SOC and considerations in each of these domains. It includes a sample job description for a SOC analyst role.
1) Electronic permit to work systems can improve work safety by streamlining repetitive paperwork tasks without compromising safety standards. This allows workers to spend more time on high-value safety activities.
2) A good electronic safety system guides users through correct safety procedures and authorizations, provides checks to strengthen the safety process, and supports both standardized and customized safety workflows.
3) Implementing an electronic safety system is an evolutionary process that standardizes safety procedures across assets while allowing customization. It requires defining new processes through collaboration and providing training to ensure proper adoption.
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj Purandare ☁
The document outlines a strategy for building an effective security operations center (SOC) in four main parts. It discusses (1) the need for a SOC and roadmap for implementation, (2) required team members, processes, technologies, and threat intelligence, (3) governance, risk, and compliance frameworks, and (4) an 11-step recipe for SOC success focusing on mission, services, people, processes, and communication. The overall strategy presents a structured approach for organizations to establish a SOC capability that enables security management and aligns with standards like ISO 27001.
Herbert Thompson is an Information Assurance Manager and Senior Server Administrator with over 20 years of experience. He is seeking a new opportunity. He has extensive experience in server administration, security, and program management for both government and commercial clients. He has a Security+ certification and secret security clearance.
This document discusses the process of conducting an information security audit. It begins by defining an information security audit and explaining that it assesses how an organization's security policies protect information. It then describes the general methodology, which involves assessing general controls at the entity, application, and technical levels. The document outlines the planning, internal control, testing, and reporting phases of an audit. It provides details on tasks like developing audit scopes and checklists, assessing policies and documentation, and writing the final audit report. The overall purpose is to explain the end-to-end process of performing an information security audit.
This document is a slide presentation for a risk management course at Illinois Institute of Technology. It discusses risk control strategies such as avoidance, transference, mitigation and acceptance. It also covers categories of controls including control function, architectural layer, strategy layer and information security principles. The overall goal is to help students understand how to identify, analyze and address risks to ensure the confidentiality, integrity and availability of organizational systems and data.
This document discusses security technologies taught in an Illinois Institute of Technology course. It covers firewalls, intrusion detection systems, dial-up protection, and other topics. The learning objectives are to define types of firewalls, discuss firewall implementation approaches, and understand technologies like encryption and biometrics. Firewalls examined include packet filtering, proxy, stateful inspection, dynamic, and kernel proxy firewalls. Intrusion detection systems can be host-based or network-based, using signatures or anomalies. Remote authentication and terminal access control systems help secure dial-up access.
In order to bid on Department of Defense (DoD) contracts, hundreds of thousands of organizations will need to be assessed for their Cybersecurity Maturity Model Certification (CMMC) Level. But how exactly does that process work?
Watch the free session here: https://www.infosecinstitute.com/webinar/cmmc-case-study-assessment/
Cruatech is a software development company that specializes in hardware integration, product development for physical security, energy management and IoT sectors, and project management. It develops integration modules and platforms like CruzControl. Cruatech has experience integrating over 80 security systems and developing solutions for challenges like retrofitting energy management hardware and developing access control using facial recognition. It ensures reliable delivery through a phased, tested approach and has received praise from partners for responsiveness.
This document discusses operations security principles and controls. It covers general security concepts like accountability, separation of duties, and least privilege. It then details various technical, physical, and administrative controls for securing hardware, software, data, communications, facilities, personnel, and operations. The goals are to prevent security issues, detect any violations, and enable recovery of systems and data if problems occur. Key areas covered include access controls, backup and disaster recovery, change management, and configuration management.
This document summarizes information about performing a security audit. It discusses examining physical security by checking where systems are located and who can access them. It also recommends verifying that security guards are employed and have been properly vetted. The document outlines that audits can be external, internal, or self-conducted. The main objectives of an audit are to assess the adequacy of security measures, physical security risk management processes, and verification that roles and responsibilities for security are clearly defined.
An introduction to SOC (Security Operation Center)Ahmad Haghighi
The document discusses building a security operations center (SOC). It defines a SOC as a centralized unit that deals with security issues on an organizational and technical level. It monitors, assesses, and defends enterprise information systems. The document discusses whether to build an internal SOC or outsource it. It also covers SOC technologies, personnel requirements, and the five generations of SOCs. It provides resources for learning more about designing and maturing a SOC.
This document provides an overview and summary of a presentation on the practical application of physical security criteria according to the Unified Facilities Criteria (UFC) 4-010-01. The presentation covers core principles of physical security design, effects of blast loading, and approaches to mitigate hazards associated with physical security. It discusses UFC 4-010-01 requirements such as levels of protection, building categories, standoff distances, applicability and exemptions. Examples are also provided on applying the criteria to new and existing building design and retrofits.
Elite ISI is introducing the Remote Guarding Vendor Comparison Tool. Now, you can
compare Elite ISI with other monitoring and security competitors and see how we measure up to the task of
protecting your facilities.
Go to http://www.eliteinteractivesolutions.com to learn more.
Contractor Management has always been challenging for project owners / organizations. With a customized software application and allied components, contractor management can become easier and highly efficient.
Project Forecasting from the Perspective of an EVMA and EIA-748Unanet
EIA-748 guidelines, as interpreted for major U.S. Government projects, require that project managers develop and maintain bottoms-up estimates of the cost and schedule outcomes of their projects. There is a requirement for a comprehensive bottoms-up forecast to be done at least annually. That is supported by a requirement for a monthly update to the forecast, including best-case, worst-case, and most-likely outcomes for the project estimated final total cost.
This webinar covers these requirements and common associated processes and methods for developing the forecasts.
Included in the discussion are the topics of risk and opportunities management and their relationship to the EVMS; especially focused on the development of the risk/opportunities informed forecasts.
Rather than the development of three potential outcomes for the project timeline, the schedule portion of the discussion focuses on building and maintaining an Integrated Master Schedule (IMS) that meets the Generally Accepted Scheduling Principles (GASP) and the use of that IMS in establishing the probability of meeting the end date based on Schedule Risk Analysis (SRA) techniques.
The discussion ends with the topic of independent evaluations of the forecast using the Independent Estimate-at-Complete (IEAC) analysis process.
Download the presentation to learn more or visit us at www.unanet.com.
Rothke secure360 building a security operations center (soc)Ben Rothke
Building a Security Operations Center (SOC) requires extensive planning and consideration of various organizational and technical factors. A SOC provides continuous monitoring, detection, and response capabilities to protect against cyber threats. It is important to determine whether to build an internal SOC or outsource these functions. Proper staffing, processes, metrics, and management are critical for SOC success.
Security Management is very complex and does not limit itself to products and technologies. It is important to consider alternatives when setting up a Security Operation Center (SOC), from insight into the business plan requirements, ability and the skill set of people who will handle the SOC, the responsibilities for the team, budget and more.
Kaustubh Sanjay Kothiwan is a project management professional with 12 years of experience managing airport security screening equipment and physical security systems. He is currently the Security Systems Administration Officer at Hamad International Airport, where he is involved in projects like the New Era of Security concept and has managed equipment from Rohde & Schwarz, Smith's Detection, and more. Kothiwan has technical skills in areas like project management, system administration, networking, and software and possesses soft skills such as teamwork, leadership, and communication.
Oraib G. Bustami is an experienced electronics engineer from the UAE with over 30 years of experience working in airport operations. He is currently a Technical Project Manager and Chief Engineer at Dubai Airports, where he manages engineering design, project procurement, and stakeholder coordination. Previously, he held manager and engineer roles related to security and surveillance systems at Dubai Airports and Dubai Civil Aviation. He has extensive expertise in electronics systems for airports including air traffic control, security, and CCTV.
The document provides an overview of information security audits from an expert's perspective. It discusses how to prepare for an audit, what to expect during each phase, how to communicate with auditors, and tips for passing the audit, including having proper documentation, controls, policies, and management support. The goal is for the audit to be a learning experience and opportunity to improve the security program rather than a failure.
This document provides information about security operations centers (SOCs). It discusses why organizations build security controls and capabilities like SOCs, which are designed to reduce risk, protect businesses, and move from reactive responses to proactive threat mitigation. The document defines a SOC as a skilled team that follows processes to manage threats and reduce security risk. It outlines the major responsibilities of a SOC, which include monitoring, analyzing, and responding to security events. It also notes that effective SOCs balance people, processes, and technology. The document provides details about building a SOC and considerations in each of these domains. It includes a sample job description for a SOC analyst role.
1) Electronic permit to work systems can improve work safety by streamlining repetitive paperwork tasks without compromising safety standards. This allows workers to spend more time on high-value safety activities.
2) A good electronic safety system guides users through correct safety procedures and authorizations, provides checks to strengthen the safety process, and supports both standardized and customized safety workflows.
3) Implementing an electronic safety system is an evolutionary process that standardizes safety procedures across assets while allowing customization. It requires defining new processes through collaboration and providing training to ensure proper adoption.
Manoj purandare - Stratergy towards an Effective Security Operations Centre -...Manoj Purandare ☁
The document outlines a strategy for building an effective security operations center (SOC) in four main parts. It discusses (1) the need for a SOC and roadmap for implementation, (2) required team members, processes, technologies, and threat intelligence, (3) governance, risk, and compliance frameworks, and (4) an 11-step recipe for SOC success focusing on mission, services, people, processes, and communication. The overall strategy presents a structured approach for organizations to establish a SOC capability that enables security management and aligns with standards like ISO 27001.
Herbert Thompson is an Information Assurance Manager and Senior Server Administrator with over 20 years of experience. He is seeking a new opportunity. He has extensive experience in server administration, security, and program management for both government and commercial clients. He has a Security+ certification and secret security clearance.
This document discusses the process of conducting an information security audit. It begins by defining an information security audit and explaining that it assesses how an organization's security policies protect information. It then describes the general methodology, which involves assessing general controls at the entity, application, and technical levels. The document outlines the planning, internal control, testing, and reporting phases of an audit. It provides details on tasks like developing audit scopes and checklists, assessing policies and documentation, and writing the final audit report. The overall purpose is to explain the end-to-end process of performing an information security audit.
This document is a slide presentation for a risk management course at Illinois Institute of Technology. It discusses risk control strategies such as avoidance, transference, mitigation and acceptance. It also covers categories of controls including control function, architectural layer, strategy layer and information security principles. The overall goal is to help students understand how to identify, analyze and address risks to ensure the confidentiality, integrity and availability of organizational systems and data.
This document discusses security technologies taught in an Illinois Institute of Technology course. It covers firewalls, intrusion detection systems, dial-up protection, and other topics. The learning objectives are to define types of firewalls, discuss firewall implementation approaches, and understand technologies like encryption and biometrics. Firewalls examined include packet filtering, proxy, stateful inspection, dynamic, and kernel proxy firewalls. Intrusion detection systems can be host-based or network-based, using signatures or anomalies. Remote authentication and terminal access control systems help secure dial-up access.
In order to bid on Department of Defense (DoD) contracts, hundreds of thousands of organizations will need to be assessed for their Cybersecurity Maturity Model Certification (CMMC) Level. But how exactly does that process work?
Watch the free session here: https://www.infosecinstitute.com/webinar/cmmc-case-study-assessment/
Cruatech is a software development company that specializes in hardware integration, product development for physical security, energy management and IoT sectors, and project management. It develops integration modules and platforms like CruzControl. Cruatech has experience integrating over 80 security systems and developing solutions for challenges like retrofitting energy management hardware and developing access control using facial recognition. It ensures reliable delivery through a phased, tested approach and has received praise from partners for responsiveness.
This document discusses operations security principles and controls. It covers general security concepts like accountability, separation of duties, and least privilege. It then details various technical, physical, and administrative controls for securing hardware, software, data, communications, facilities, personnel, and operations. The goals are to prevent security issues, detect any violations, and enable recovery of systems and data if problems occur. Key areas covered include access controls, backup and disaster recovery, change management, and configuration management.
This document summarizes information about performing a security audit. It discusses examining physical security by checking where systems are located and who can access them. It also recommends verifying that security guards are employed and have been properly vetted. The document outlines that audits can be external, internal, or self-conducted. The main objectives of an audit are to assess the adequacy of security measures, physical security risk management processes, and verification that roles and responsibilities for security are clearly defined.
An introduction to SOC (Security Operation Center)Ahmad Haghighi
The document discusses building a security operations center (SOC). It defines a SOC as a centralized unit that deals with security issues on an organizational and technical level. It monitors, assesses, and defends enterprise information systems. The document discusses whether to build an internal SOC or outsource it. It also covers SOC technologies, personnel requirements, and the five generations of SOCs. It provides resources for learning more about designing and maturing a SOC.
This document provides an overview and summary of a presentation on the practical application of physical security criteria according to the Unified Facilities Criteria (UFC) 4-010-01. The presentation covers core principles of physical security design, effects of blast loading, and approaches to mitigate hazards associated with physical security. It discusses UFC 4-010-01 requirements such as levels of protection, building categories, standoff distances, applicability and exemptions. Examples are also provided on applying the criteria to new and existing building design and retrofits.
Elite ISI is introducing the Remote Guarding Vendor Comparison Tool. Now, you can
compare Elite ISI with other monitoring and security competitors and see how we measure up to the task of
protecting your facilities.
Go to http://www.eliteinteractivesolutions.com to learn more.
Contractor Management has always been challenging for project owners / organizations. With a customized software application and allied components, contractor management can become easier and highly efficient.
Project Forecasting from the Perspective of an EVMA and EIA-748Unanet
EIA-748 guidelines, as interpreted for major U.S. Government projects, require that project managers develop and maintain bottoms-up estimates of the cost and schedule outcomes of their projects. There is a requirement for a comprehensive bottoms-up forecast to be done at least annually. That is supported by a requirement for a monthly update to the forecast, including best-case, worst-case, and most-likely outcomes for the project estimated final total cost.
This webinar covers these requirements and common associated processes and methods for developing the forecasts.
Included in the discussion are the topics of risk and opportunities management and their relationship to the EVMS; especially focused on the development of the risk/opportunities informed forecasts.
Rather than the development of three potential outcomes for the project timeline, the schedule portion of the discussion focuses on building and maintaining an Integrated Master Schedule (IMS) that meets the Generally Accepted Scheduling Principles (GASP) and the use of that IMS in establishing the probability of meeting the end date based on Schedule Risk Analysis (SRA) techniques.
The discussion ends with the topic of independent evaluations of the forecast using the Independent Estimate-at-Complete (IEAC) analysis process.
Download the presentation to learn more or visit us at www.unanet.com.
Rothke secure360 building a security operations center (soc)Ben Rothke
Building a Security Operations Center (SOC) requires extensive planning and consideration of various organizational and technical factors. A SOC provides continuous monitoring, detection, and response capabilities to protect against cyber threats. It is important to determine whether to build an internal SOC or outsource these functions. Proper staffing, processes, metrics, and management are critical for SOC success.
Security Management is very complex and does not limit itself to products and technologies. It is important to consider alternatives when setting up a Security Operation Center (SOC), from insight into the business plan requirements, ability and the skill set of people who will handle the SOC, the responsibilities for the team, budget and more.
Kaustubh Sanjay Kothiwan is a project management professional with 12 years of experience managing airport security screening equipment and physical security systems. He is currently the Security Systems Administration Officer at Hamad International Airport, where he is involved in projects like the New Era of Security concept and has managed equipment from Rohde & Schwarz, Smith's Detection, and more. Kothiwan has technical skills in areas like project management, system administration, networking, and software and possesses soft skills such as teamwork, leadership, and communication.
Oraib G. Bustami is an experienced electronics engineer from the UAE with over 30 years of experience working in airport operations. He is currently a Technical Project Manager and Chief Engineer at Dubai Airports, where he manages engineering design, project procurement, and stakeholder coordination. Previously, he held manager and engineer roles related to security and surveillance systems at Dubai Airports and Dubai Civil Aviation. He has extensive expertise in electronics systems for airports including air traffic control, security, and CCTV.
Dinesh Pardeshi has over 12 years of experience in project engineering and management roles related to security, communication, CCTV, access control, and fire alarm systems. He currently works as an Electronics Engineer at Hamad International Airport in Qatar, where he is responsible for supervising technical and maintenance employees and assisting with development and implementation of plans and policies for various systems. Previously he has served as a Superintendent for a construction company in Saudi Arabia managing installation projects for CCTV, access control, fire alarm and other systems. He also has experience as a Project Lead for an IT company in India implementing low voltage systems.
A competent professional with 5 years of experience in:
Project Management Operations & Maintenance Installation & Commissioning
Testing & Inspection Safety Compliance Vendor Management
Manpower Planning Cost Control Reporting & Documentation
• Currently associated with L&T Construction (Smart World Communication- IC), Chennai as Senior Engineer (Electrical)
• Expertise in proactively identifying & resolving problems, ramping up project activities with on time deliverables; maximizing efficiency; maintaining flow of work between department
Abdul Jayfar TMC is a senior project engineer with over 10 years of experience managing security systems projects. He has expertise in access control, CCTV, and integrated security systems. Some of his project experiences include access control systems for petrochemical plants and banks, solar-powered wireless CCTV systems, and queue management systems for government offices. He is proficient in project management, technical installation and configuration, and has security certifications.
This document is a resume for Farook Suleman, a CCTV engineer based in Abu Dhabi, UAE. It outlines his 11 years of experience in CCTV and security systems design, including 7 years working on bank projects in Saudi Arabia and with the Department of Transport in Abu Dhabi. His skills include installing, configuring, and maintaining IP cameras, access control systems, video management software, and more. Currently he works as a CCTV engineer for Multinet IT Solutions in Abu Dhabi, where he has managed several projects for government clients.
This document provides a summary of P. Ravindra's professional experience and qualifications. He has over 28 years of experience in aviation and information security fields, including 17 years in the aviation sector. Currently, he works as a consultant for aviation and information security at Zen Technologies Limited in Hyderabad. He has extensive experience managing projects, teams, quality assurance, and information security systems.
John kingsley OT ICS SCADA Cyber security consultantJohn Kingsley
John kingsley OT ICS SCADA Cyber security consultant
SCADA ICS Security Courses
Lack of SCADA ICS security professionals that lead to big gaps between compliance against the respected guidelines with the real situation at site. Critical needs for proper security professional in SCADA ICS
SCADA ICS Security Assurance
Ensuring the SCADA ICS environment to comply with the security requirements in order to maintain the production operations and sustain the business performance
SCADA ICS (OT) Security Services
SCADA ICS Security Services Summary
SCADA ICS Security Asset Management
SCADA ICS Security Risk Management
SCADA ICS Security Assessment
SCADA ICS Standard, Policy & Procedure Management
SCADA ICS Security Implementation
Cyber Security Services
Vulnerability Assessment
Penetration Testing
ISO 27001 Certified Management System Audit
Big Bear Safety & Security Management provides professional security services for large construction projects in China, having successfully managed security for projects worth billions of dollars. They offer security project management and turnkey security solutions, including risk assessment, planning, guard forces, access control, and security infrastructure. Their managing director has decades of experience in military intelligence, security auditing, and protecting major projects for companies like Shell, Bayer, and Dow Corning. Big Bear aims to deliver security services transparently and to the highest ethical standards.
I have been working in the area of information technology for more than 17 years with Elgouna School . I have experienced in IT and computer systems with ElGouna Resort Real estate and construction company. I performed and directed a various activities related to IT. I managed tasks of more than (6) IT staffs. I conducted research to build innovative information technology system that is more effective than the past.
I have good leadership skills that make me capable for leading other staffs. I am effective organizer and planner. I have innovative idea for IT problems. I am able to work under pressure. My self-discipline will give benefits for your company.
I attached my resume a long this letter. I hope my resume can explain my experience and expertise’s clearly. I wish to join your company and It will be my new challenge.
The document provides a summary of Nemer Barbakhs qualifications and experience as a Project Control Manager for a security systems division. Over his career, he has gained experience in project management, technical support, installation, maintenance, and troubleshooting of various security systems. Currently, he is seeking new employment opportunities where he can further utilize his strong technical and management skills.
David Morales has over 20 years of experience in technology project management and customer support roles. He holds a degree in Network Administration and has managed numerous projects at the San Francisco International Airport involving systems upgrades, infrastructure implementation, and security enhancements. Currently he is a Technical Project Manager responsible for analyzing applications, managing vendors, and implementing various technology solutions.
Amit Kumar Bharti has over 12 years of experience in airport security systems design, estimation, and implementation. He currently works as a Design Manager for Bayanat Airports Engineering & Supplies LLC in Abu Dhabi. He has extensive experience designing, estimating, and managing projects for CCTV, access control, intruder alarms, cabling, and other airport systems. He holds several industry certifications and has managed large projects in the Middle East and India.
Pradeepan Kombilath has over 13 years of experience in site management, installation, testing, and quality assurance of electronic security systems. He has expertise in project management, site planning, and ensuring compliance with quality standards for ELV projects. Pradeepan is skilled in installation and commissioning of structured cabling, CCTV, access control, fire alarm, and PA systems. He is resourceful in identifying and resolving problems to ensure on-time project deliverables and efficiency.
Summarize the design and build approach for SOC (Security Operation Center) for both end user company and service providers. Defines the approach flow for SOC building and various components and phases involved. Defines design thumb rules and parameters for SOC Design.
Muhammad Yasir is seeking a position that utilizes his skills in project management and allows for advancement. He has over 10 years of experience managing installation, maintenance, and operation projects for security and telecommunication systems. His experience includes budgeting, scheduling, troubleshooting, and ensuring compliance with procedures. He is proficient in various software programs and skilled in network troubleshooting.
Anthony D'Amico has over 19 years of experience as a VP-level project manager in the financial industry. He has a Masters in Information Systems and Bachelor's in Computer Applications. D'Amico has extensive experience managing IT projects involving vulnerability threat management, disaster recovery, and network integration. Most recently, he was a Technical Advisor Project Manager at Citigroup where he managed their global vulnerability threat management process and performed risk assessments on 36,000 network devices.
The document provides a summary of Michael Myers' professional experience and qualifications. It summarizes that he has over 25 years of experience in information technology systems management, directing IT initiatives, and designing and implementing network solutions. It lists his areas of expertise, technical proficiencies and certifications. It then describes his most recent roles providing IT support and managing network connectivity for enterprise migration projects.
This document summarizes a job posting for a Security Specialist/Engineer role at a leading media organization. The role involves enforcing security policies and tools, managing firewalls, intrusion prevention systems, and antivirus tools. Responsibilities include performing security reviews, managing change controls, and advising teams on security issues. The ideal candidate has hands-on security experience, knowledge of security technologies like Checkpoint and Juniper firewalls, and experience deploying complex security solutions in demanding environments.
Ahmed Barakat Abdel Baky Sonbol has over 15 years of experience in information technology and security. He received a BSC in electronics and communication engineering from Ain Shams University in 2001. He has held several leadership roles in IT security and has extensive technical training and certifications in networking, security, and project management. Currently, he is the IT Information Security Head at Abu Dhabi Islamic Bank where he manages security projects and assesses risks.
Similar to Kaustubh updated resume 2020- 16th sept. (2) (20)
A Guide to a Winning Interview June 2024Bruce Bennett
This webinar is an in-depth review of the interview process. Preparation is a key element to acing an interview. Learn the best approaches from the initial phone screen to the face-to-face meeting with the hiring manager. You will hear great answers to several standard questions, including the dreaded “Tell Me About Yourself”.
Resumes, Cover Letters, and Applying OnlineBruce Bennett
This webinar showcases resume styles and the elements that go into building your resume. Every job application requires unique skills, and this session will show you how to improve your resume to match the jobs to which you are applying. Additionally, we will discuss cover letters and learn about ideas to include. Every job application requires unique skills so learn ways to give you the best chance of success when applying for a new position. Learn how to take advantage of all the features when uploading a job application to a company’s applicant tracking system.
5 Common Mistakes to Avoid During the Job Application Process.pdfAlliance Jobs
The journey toward landing your dream job can be both exhilarating and nerve-wracking. As you navigate through the intricate web of job applications, interviews, and follow-ups, it’s crucial to steer clear of common pitfalls that could hinder your chances. Let’s delve into some of the most frequent mistakes applicants make during the job application process and explore how you can sidestep them. Plus, we’ll highlight how Alliance Job Search can enhance your local job hunt.
Leadership Ambassador club Adventist modulekakomaeric00
Aims to equip people who aspire to become leaders with good qualities,and with Christian values and morals as per Biblical teachings.The you who aspire to be leaders should first read and understand what the ambassador module for leadership says about leadership and marry that to what the bible says.Christians sh
Jill Pizzola's Tenure as Senior Talent Acquisition Partner at THOMSON REUTERS...dsnow9802
Jill Pizzola's tenure as Senior Talent Acquisition Partner at THOMSON REUTERS in Marlton, New Jersey, from 2018 to 2023, was marked by innovation and excellence.
Job Finding Apps Everything You Need to Know in 2024SnapJob
SnapJob is revolutionizing the way people connect with work opportunities and find talented professionals for their projects. Find your dream job with ease using the best job finding apps. Discover top-rated apps that connect you with employers, provide personalized job recommendations, and streamline the application process. Explore features, ratings, and reviews to find the app that suits your needs and helps you land your next opportunity.
1. KAUSTUBH SANJAY KOTHIWAN
Mobile: +974-33448420
E-Mail: kaustubhk19@gmail.com / kaustubhkothiwan@yahoo.in
PASSPORT NUMBER: J6279931
PROFESSIONAL PROFILE
A competent professional with 12 years of experience as Project Lead of
Airport Security Screening Equipment’s, CCTV & ACS Security Systems,
Network & Data Center Administration.
Currently associated with Hamad International Airport, as Security Systems
Administration Officer (Project Lead)
SUMMARY
Accomplished, motivated project management professional with diverse
project management experience in IT, Physical Security Systems and Airport
Security Screening Systems.
Skilled at managing projects from beginning to end, while juggling multiple
projects simultaneously.
Effectively defines, develops and implements targeted action plans to
maximize efficiency and profitability.
SKILLS
SOFT SKILLS TECHNICAL SKILLS &
CERTIFICATIONS
PROJECT
MANAGEMENT SKILLS
Team Work PMP® Certified Project Management of
ACI Smart Security
Concepts
Leadership ITIL V3 Project Management of
Airport Security
Operations
Corporate Behavior CCNA IT Project Management
Change & Innovation MS Office Expert Documents making skills
Service Delivery Excel Macros Expert Vendor Management
Time Management UTC FCWNX-VSC, Indigo-
Vision Administrator
Stakeholder’s
Management
Strong Organizational
Skills
VB Deadline Driven
Strong interpersonal
Skills
System Development Timely Project
Completion
Solid Communication
skills
UAT TestingPlanning Employee Productivity
Reports
Adaptable Power BI Establishing goals and
setting priorities
2. EXPERIENCE
PERIOD ROLE COMPANY NAME
2017 – Till now Security Systems Administration Officer Hamad International Airport
2013 - 2017 TS – Engineer (IT) Hamad International Airport
2012 - 2013 IT Consultant Net-Scout IT Technology (Qatar
Airways as Client)
2012 - 2012 Network Support Engineer L-2 Net-Scout IT Technology
2011 - 2012 Network Support Engineer L-2 WYSETEK Technology
2010 - 2011 Assistant Engineer 3I InfoTech Pvt. Ltd.
2009 - 2010 Electronics Engineer Spruha Electronics Systems
CAREER HIGHLIGHTS
Aug, 17 – Till now, Security Systems Administration Officer (Project Lead)
Hamad International Airport, Doha, Qatar
Project Management
Security Operations Management Platform: putting in a new platform in the SOC to help with inci
dents and events, metrics and reporting
Responsible for project oversight, governance, and status reporting using the approved manage
ment methodology
Responsible for partnership building and communication with IT Risk Security Management and a
ll line of relevant business stakeholders
Ensure that issues blocking the success of the project are identified and brought to the attention
Threat Intelligence Platform: part of the above project implementing a the threat intelligence plat
form into the SOC
Lead the planning and implementation of project/program
Work with different Airports and Airlines to assist the global Security Operations Manager in defin
ing the overall security response strategy for HIA.
Develop technical documentation describing the deployment, configuration, and management of
shared, networked, and multi-user information security systems
Work with Security Site Managers to improve security policies, standards and practices and build
a safe and secure environment for our Airport employees and guests
Regularly evaluate the department or teams objectives, plans, procedures and practices, and ma
kes appropriate changes if needed.
Oversee and supervise employees. Direct daily activities, recruit, train, develop and discipline to e
nsure a high standard of service delivery.
Managed Access Control Replacement projects, replacement of almost 5500 Card readers, 2700
Controllers. Replaced UTC system with CEM AC2000.
Involved as Project Leader for the Airport Council International Smart Security Projects such as
Landside and Airside Security majors, Proof of concepts for: Rohde & Schwarz Quick personnel
scanner QPS-200, QPS-201, APSTEC HSR Human Security Radar, Smith’s Detection ETD 600 and
ETD-500DT, Smith’s Detection X-ray Software C2 and IPSOTEK video Analytics configuration and
testing.
Involved in gap analysis projects of Airport CCTV installation of 14000 new smart technology
cameras with video analytics concept.
Operational
3. Provide administrative support to Airport Security operations in connection with the usage of te
chnical security systems, and implementation of security policy set up by the Manager of Securi
ty Systems and Hardware. Responsibilities include coordination and providing documentation, i
n close cooperation with the Airport Security, Airline Security and Government Agencies.
Contributes in the assessment and evaluation of Airport Security, contracted service providers a
nd Airport Pass enrolment staff performance; contributes in investigation and reporting of secur
ity incidents.
Liable for creating statistics and reports from system data for Airport Security and other stakeh
olders.
Supports the technical services responding on reported systems malfunctions and supervises pl
anned maintenance activities and represents the end user in handing over of repaired assets as
well as newly delivered equipment.
Manages the necessary documentation for system configuration and end-user training, based o
n the policy developed by Airport Security.
Communicates with responsible stakeholders with regards to staff access definitions and reques
ts; manages the staff access database.
Supports the Airport Pass Office operations and is responsible to provide documentation and su
pport to the enrolment team on Access Control zoning.
Technical
All the Airport Security Systems projects has been handled and delivered in time, with
appreciation.
Troubleshoot and assist in repairing various access control systems, IP video surveillance syste
ms, CCTV systems, intrusion systems and networking equipment’s.
Managed and developed all the project documents and reports.
Involved in gap analysis projects of Airport CCTV installation of 1100 new smart technology
cameras with video analytics concept.
Developed 5 new macros based application to capture the manual data during the POC of QPS-
201, all these applications were based on Visual basics programming.
Responsible of follow up with different projects status on the sites according to the projects
plans.
Installation of Biometric Access Control systems and Access Control System
Assembling of NVRs & installation of OS in NVRs
Actively involved in creation of access rights and rezoning of access rights in the access
control system.
Managed software like CEM AC2000, UTC VSC & FCWNX and Indigo vision.
Handling different stakeholders of Qatar Airways, Customs & MOI Operators.
Site surveys and provide sales engineering support, including collecting and recording detailed
operational, functional and technical requirements, developing project scopes, and providing
overall system costing for Access Control & CCTV projects.
Understanding plans and specifications to identify the types and grades of materials and
equipment needed to ensure compliance with project requirements.
Knowledge of design techniques, tools, and principals involved in the production of security
plans, blueprint and drawings developing specific goals and plans to prioritize, organize, and
accomplish Work.
Corrective Maintenance and Troubleshooting of the faults happened in cameras and Access
control
Systems.
Prepare, monitor and report on all planned preventative maintenance (PPMs) for all security
systems
CCTV, Access Control, Barriers, and Fingerprint Time & Attendance Systems.
Installation and maintenance/work records detailing of all activities carried out on site which
include drawings, O&Ms, Reports, Task sheets, Completion certificates, Accident and
Incident Reports etc.
4. Aug, 13 – Apr, 17, Technology Service - Engineer
Hamad International Airport, Doha, Qatar
Responsible of follow up with different projects status on the sites according to the projects plans.
Installation of CCTV cameras (Box, Dome, PTZ)
Installation of Biometric Access Control systems.
Assembling of NVRs & installation of OS in NVRs
Installing Networks (LAN).
Installation of different types of CCTV cameras as per drawing
diagrams. Troubleshooting of NVRs & cameras.
Handling FCWNX and Indigo vision.
Tech support for Qatar Airways, HIA & MOI Operators.
Configuring different alert alarms for doors.
Site surveys and provide engineering support, including collecting and recording detailed
operational, functional and technical requirements, developing project scopes, and providing
overall system costing for Access Control & CCTV projects.
Understanding plans and specifications to identify the types and grades of materials and
equipment needed to ensure compliance with project requirements.
Managed and developed techniques, tools and principals.
Involved in the production of security plans, blueprint and drawings developing specific goals
and plans to prioritize, organize, and accomplish work.
Corrective Maintenance and Troubleshooting of the faults happened in cameras and Access control
Systems.
Prepare, monitor and report on all planned preventative maintenance (PPMs) for all security
systems
CCTV, Access Control, Barriers, and Fingerprint Time & Attendance Systems.
Installation and maintenance/work records detailing of all activities carried out on site which
include drawings, O&Ms, Reports, Task sheets, Completion certificates, Accident and Incident
Reports etc.
July, 12 – July, 13 IT CONSULTANT (Doha, Qatar)
Netscout - IT Technology, MUMBAI ON CLIENT SITE Qatar Airways, Doha, Qatar
Design, installation, configuration, integration, testing and Maintenance of CCTV and Access
Control System, Barriers and other Security Systems.
Working with LENEL Application System by Configuring On guard
Software, Monitoring the Alarm Systems.
Site surveys and provide sales engineering support, including collecting and recording
detailed operational, functional and technical requirements, developing project scopes, and
providing
Overall system costing for Access Control & CCTV projects.
Understanding plans and specifications to identify the types and grades of materials
and equipment needed to ensure compliance with project requirements.
Corrective Maintenance and Troubleshooting of the faults happened in cameras and Access control
Systems.
Prepare, monitor and report on all planned preventative maintenance (PPMs) for all
security systems CCTV, Access Control, Barriers, and Fingerprint Time & Attendance
Systems.
Installation and maintenance/work records detailing of all activities carried out on site which
include drawings, O&Ms, Reports, Task sheets, Completion certificates, Accident and Incident
Reports etc.
Jan, 12 – July, 12 NETWORK SUPPORT ENGINEER LEVEL-2. (NAVI MUMBAI, Kharghar)
Netscout IT Technology, MUMBAI ON CLIENT SITE RBI, Data center
5. Managed the Cisco switches7600, 6500, 2950, 2960, 3560E, 3560C, 3750 series.
Managed the Cisco routers 3800, 2900, 1800 series.
Maintained the Inventory of all IT equipment’s.
Developed Network Infrastructure Document for CBS Project for 3 sites Mumbai, New
Mumbai and Nagpur.
Managed to take the daily backup of Cisco LMS, WCS, ACS, Routers, and Switches & Call Manager.
Provided the technical support for the maintenance of LAN, WAN, Routers and access
switches & Wireless.
Monitor Internet, Point to Point, PRI.
Performance analysis and Diagnosis of day to day networking problems and Reporting.
Maintained the Change Management, Incident, Problem, daily checklist & Service call report.
Created and troubleshoot VLAN, Trunk, STP, SNMP, access-list and IP route.
Configured, Authentication and Maintenance Wireless controller 5508 and access point 1252
Managed Wireless control system.
Responsibility involves Maintenance of Call Manager, Technical Support & Co-ordinate with service
provider.
Configuration and Maintenance of VOIP network & Internet Cisco IP Phones series 6921.
Hands-on experience of troubleshooting Cisco Call Manager to enable features and services to
include
Call route Partition, Speed dials, Call Park, Call Pickup, Call Forward all…
Managed Customer’s network using NMS like Cisco Works-LMS and WCS
Maintaining Change Management & Incident and Problem Management database, daily checklist
and service call report.
Configured the password management of network devices using Network Management Software
ACS.
Internally escalating problems as well as externally wherever necessary in order to meet SLAs.
Aug, 11 - Dec’11 NETWORK SUPPORT ENGINEER LEVEL-2. (NAVI MUMBAI, PANVEL)
WYSETEK Technology, IBM INDIA PVT LTD as Client, MUMBAI
Managed the Cisco switches 7600, 6500, 2950, 2960, 3560E, 3560C, 3750 series.
Managed the Cisco routers 3800, 2900, 1800 series.
Maintained the Inventory of all IT equipment’s.
Developed Network Infrastructure Document for CBS Project for 3 sites Mumbai, New
Mumbai and Nagpur.
Managed to take the daily backup of Cisco LMS, WCS, ACS, Routers, and Switches & Call Manager.
Provided the technical support for the maintenance of LAN, WAN, Routers and access
switches & Wireless.
Monitored Internet, Point to Point, PRI.
Performance analysis and Diagnosis of day to day networking problems and Reporting.
Maintained the Change Management, Incident, Problem, daily checklist & Service call report.
Created and troubleshoot VLAN, Trunk, STP, SNMP, access-list and IP route.
Configured, Authentication and Maintenance Wireless controller 5508 and access point 1252
Managed Wireless control system.
Responsibility involves Maintenance of Call Manager, Technical Support & Co-ordinate with service
provider.
Configuration and Maintenance of VOIP network & Internet Cisco IP Phones series 6921.
Hands-on experience of troubleshooting Cisco Call Manager to enable features and services to
include
Call route Partition, Speed dials, Call Park, Call Pickup, Call Forward all…
Managed Customer’s network using NMS like Cisco Works-LMS and WCS
Maintaining Change Management & Incident and Problem Management database, daily checklist
and service call report.
Configured the password management of network devices using Network Management Software
ACS.
Internally escalating problems as well as externally wherever necessary in order to meet SLAs.
Oct’10 - Aug'11 ASSISTANT ENGINEER FOR NETWORK SUPPORT. (GONDIA)
3I INFOTECH PVT. LTD., MUMBAI (POSTING AT GONDIA) NETWORK LEVEL - 1
6. LAN and wan management.
VLAN, loopback interface and route summarization.
Antivirus up gradation on all machines troubleshooting of virus problems.
Tested links by giving local loop and remote loop.
Created new LANs using hubs.
Managed all lease lines of 34mbps total speed.
Managed the Routing protocol BGP.
All Network Documentation done by our team in that I played major role.
Coordinated with Service provider & give complete Technical Support.
Daily Monitoring devices and made Service Call report of Links.
Daily Network Device Health Check report.
June’09 – Oct’10 Network & Electronics Support ENGINEER (NAGPUR)
SPRUHA ELECTRONICS SYSTEM, Nagpur
Developed Visual Basics Programs
Developed Microsoft Excel programs using macros
PCB designing by using ORCAD.
All type of circuit testing.
Handling product marketing.
Making all technical information booklets of products.
Made production information display for ISPAT, SUNFLAG.
Troubleshoot all circuits’ problems.
Work on different sites for troubleshooting the problems.
Expert in system installation, configuration, administration, and integration.
Analytical and technical expertise.
Expert in network operations.
EDUCATION
B.E (Electronics Engineering) Nagpur University, Nagpur 2009
H.S.C (12th class) Maharashtra board 2004
S.S.C (10th class) Maharashtra board 2002
PERSONAL DETAILS
Name : Kaustubh S. Kothiwan
Father’s Name: Sanjay M. Kothiwan
Date of Birth : 19 Dec, 1986
Marital Status: Married
Permanent Add: Plot No 19, Vastu Swapna Apts., Navnirman colony, Pratap Nagar, Nagpur. 440022
The above mentioned details are true to the best of my knowledge.
Signature:
Date: Kaustubh Sanjay Kothiwan