Kaustubh Sanjay Kothiwan is a project management professional with 12 years of experience managing airport security screening equipment and physical security systems. He is currently the Security Systems Administration Officer at Hamad International Airport, where he is involved in projects like the New Era of Security concept and has managed equipment from Rohde & Schwarz, Smith's Detection, and more. Kothiwan has technical skills in areas like project management, system administration, networking, and software and possesses soft skills such as teamwork, leadership, and communication.
- Kaustubh Sanjay Kothiwan is a Project Management professional with over 13 years of experience managing security projects in airports.
- He is currently working as a Security Systems Administration Officer at Hamad International Airport in Doha, Qatar.
- Prior to this role, he held positions managing IT, security systems, and airport security screening equipment projects.
This document is a curriculum vitae for VeerannaBabu I that outlines his professional experience and qualifications. He has 3 years of experience developing LabVIEW software and is a Certified LabVIEW Developer. Some of his project experience includes developing data acquisition systems, automated test jigs, and real-time control systems using NI hardware and LabVIEW for various defense organizations in India. He has expertise in communication protocols, NI hardware platforms, and software development best practices.
MYND is an engineering company offering safety systems design, automation engineering, and consulting services. It was founded by Managing Director Arnoldi Davide and employs experienced engineers. MYND's main services include safety instrumented system design according to international standards IEC61508 and IEC61511, as well as automation and process control engineering. MYND has experience working on projects in industries such as oil/gas, petrochemicals, and power.
IRJET- Design of SCADA based Wireless Monitoring and ControlIRJET Journal
This document describes the design of a SCADA-based wireless monitoring and control system. It uses Indusoft Web Studio software to allow remote monitoring of an industrial process over wireless networks. Key aspects include:
1) Indusoft Web Studio is used to design HMI screens for monitoring process variables from a cascade loop (flow and level) controlled by a Honeywell DCS over Modbus TCP/IP.
2) An Internet Information Services manager publishes the HMI screens via HTTP to allow access from any computer on the network.
3) The final system allows remote monitoring and control of the industrial process from the HMI screens, including alarms and trends, to improve safety by giving engineers oversight.
The document provides information on an Information Security Audit Consultant with over 8 years of experience in information security audits, risk assessments, network security, and compliance audits. The consultant has technical skills in networking, security administration, and project management and security certifications including CISSP, CISA, and CEH. Previous work experience includes security roles in telecom, finance, and other industries.
Big Bear Safety & Security Management provides professional security services for large construction projects in China, having successfully managed security for projects worth billions of dollars. They offer security project management and turnkey security solutions, including risk assessment, planning, guard forces, access control, and security infrastructure. Their managing director has decades of experience in military intelligence, security auditing, and protecting major projects for companies like Shell, Bayer, and Dow Corning. Big Bear aims to deliver security services transparently and to the highest ethical standards.
Cruatech is a software development company that specializes in hardware integration, product development for physical security, energy management and IoT sectors, and project management. It develops integration modules and platforms like CruzControl. Cruatech has experience integrating over 80 security systems and developing solutions for challenges like retrofitting energy management hardware and developing access control using facial recognition. It ensures reliable delivery through a phased, tested approach and has received praise from partners for responsiveness.
- Kaustubh Sanjay Kothiwan is a Project Management professional with over 13 years of experience managing security projects in airports.
- He is currently working as a Security Systems Administration Officer at Hamad International Airport in Doha, Qatar.
- Prior to this role, he held positions managing IT, security systems, and airport security screening equipment projects.
This document is a curriculum vitae for VeerannaBabu I that outlines his professional experience and qualifications. He has 3 years of experience developing LabVIEW software and is a Certified LabVIEW Developer. Some of his project experience includes developing data acquisition systems, automated test jigs, and real-time control systems using NI hardware and LabVIEW for various defense organizations in India. He has expertise in communication protocols, NI hardware platforms, and software development best practices.
MYND is an engineering company offering safety systems design, automation engineering, and consulting services. It was founded by Managing Director Arnoldi Davide and employs experienced engineers. MYND's main services include safety instrumented system design according to international standards IEC61508 and IEC61511, as well as automation and process control engineering. MYND has experience working on projects in industries such as oil/gas, petrochemicals, and power.
IRJET- Design of SCADA based Wireless Monitoring and ControlIRJET Journal
This document describes the design of a SCADA-based wireless monitoring and control system. It uses Indusoft Web Studio software to allow remote monitoring of an industrial process over wireless networks. Key aspects include:
1) Indusoft Web Studio is used to design HMI screens for monitoring process variables from a cascade loop (flow and level) controlled by a Honeywell DCS over Modbus TCP/IP.
2) An Internet Information Services manager publishes the HMI screens via HTTP to allow access from any computer on the network.
3) The final system allows remote monitoring and control of the industrial process from the HMI screens, including alarms and trends, to improve safety by giving engineers oversight.
The document provides information on an Information Security Audit Consultant with over 8 years of experience in information security audits, risk assessments, network security, and compliance audits. The consultant has technical skills in networking, security administration, and project management and security certifications including CISSP, CISA, and CEH. Previous work experience includes security roles in telecom, finance, and other industries.
Big Bear Safety & Security Management provides professional security services for large construction projects in China, having successfully managed security for projects worth billions of dollars. They offer security project management and turnkey security solutions, including risk assessment, planning, guard forces, access control, and security infrastructure. Their managing director has decades of experience in military intelligence, security auditing, and protecting major projects for companies like Shell, Bayer, and Dow Corning. Big Bear aims to deliver security services transparently and to the highest ethical standards.
Cruatech is a software development company that specializes in hardware integration, product development for physical security, energy management and IoT sectors, and project management. It develops integration modules and platforms like CruzControl. Cruatech has experience integrating over 80 security systems and developing solutions for challenges like retrofitting energy management hardware and developing access control using facial recognition. It ensures reliable delivery through a phased, tested approach and has received praise from partners for responsiveness.
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
This webinar will help you get more informed on PenTesting in SCADA and also best practices and methods used on risk assessment. Learning about the criticality in industry, makes you more flexible to boost the skills.
Main points covered:
• The SCADA ICS function in critical infrastructure industry
• Risk exposure of IT vs. SCADA ICS from Cyber Security Perspective
• Do's and don’ts of Vulnerability Assessment and Penetration Testing in SCADA ICS Environment
Presenter:
This webinar was presented by Pedro Putu Wirya, an IT and ICS Security Consultant with an extensive experience in ISMS, and PECB Certified Trainer.
Link of the recorded session published on YouTube: https://youtu.be/icq-RTwusZ8
This document provides an overview of SCADA (Supervisory Control and Data Acquisition) security challenges and strategies. It describes common SCADA system components and functionality. It then discusses increasing cyber threats to SCADA systems from sources like hostile governments and employees. The document outlines various physical and cyber vulnerabilities in SCADA systems and components. It recommends security standards from organizations like NIST, ISA, and NERC to help mitigate risks. The document also provides guidelines on physical asset security and cybersecurity strategies.
1.Car Security
Understanding the Car Onboard Communication / Connection and inherent Security Weakness
2.Addressing the Security Concerns : System’s Viewpoint
Hardware Security Module & Secure Hardware Extension
Look at Software Principle of MAC and Associated Hardware
3.Achieving Security implementation checks via Software and Addressing the Hardware Safety aspect.
Closing the Loop for Security Safeness: Complete Solution to Ensure Security/Safety Compliance with Software
This document provides information about DornerWorks, an engineering firm that specializes in embedded software and electronic hardware design. It details DornerWorks' experience in aerospace projects involving DO-254 standards compliance, including projects for Boeing, Airbus, and Embraer. It describes DornerWorks' staff of over 50 engineers who have experience with FPGA design, VHDL, simulation tools, and executing DO-254 processes. Case studies are presented on projects involving Boeing 787 and Airbus A400 components. Partnerships with certification authorities and manufacturers are also mentioned.
This document provides a summary of Mahmoud Abdelmottaleb Fitaihi's qualifications and experience in industrial automation. It outlines his educational background in communication and electronics engineering and over 8 years of experience designing, implementing, and supporting process control systems using Triconex safety instrumentation systems and DCS platforms. Recent project experience includes roles as lead engineer on expansion projects at Yanbu Refinery and Yanbu Crude Oil Terminal for Saudi Aramco.
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
Presenters: Robert Landavazo, PNM Resources and Katherine Brocklehurst, Tripwire
With countless hours of work to go, PNM was far from ready for its coming audit in just 18 months. Confidence levels in its existing manual, and incomplete security controls, were at an all-time low; and the visibility into control center environments for quantifying its status and progress towards compliance was immeasurable.
With Tripwire, PNM’s preparation of the looming CIPv3 audit noticeably improved. With efficient reporting and automation, PNM’s now positioned to hold itself accountable for CIP auditable compliance of more than 3,500 explicit and supporting control points, satisfying CIP-002-3, CIP-004-3, CIP-005-3, CIP-007-3 and CIP-009-3. In addition, enhanced visibility and better control gave PNM the ability to effectively communicate meaningful and measurable initiatives to executive teams – resulting in increased support for their funding needs.
In this session, PNM – New Mexico’s largest electricity provider – will share a case study on its journey towards achieving continuous NERC CIP compliance despite a highly limited headcount, how it saved countless hours of labor-intensive manual effort, and the essential role that automation played in its success.
This position paper of the SIL Platform (www.nen.nl) indicates that it is common practice to operate process plants at maximum performance, optimum capacity and minimum risk levels. A Safety Integrity Level (SIL) is often determined through e.g. a Layer of Protection Analysis (LOPA) [1] [2]
[3], which is a means to quantify risks. However, LOPA is usually not the starting point for quantifying risks. This is often done with the use of a Risk Assessment Matrix (RAM). Contrary to LOPA and SIL, the use and type of RAM is not clearly pre-scribed or defined.
The intention of this guide is to provide guidance on RAM and show the relations between RAM, LOPA and SIL levels. What are the pitfalls? What is usually applied? What is often missed? It is not the intention to explain in detail the various available risk assessment techniques.
How to arrive at a SIL level in the correct manner leading to a qualitatively proper design and implementation is described in the EN-IEC 61511 standard [4]. Achieving a SIL requires amongst other aspects:
Correct identification of Safety Instrumented Functions (SIF)
Correct determination of required SIL rating of the various SIFs.
This guide strives to improve this quality by improving the quality of the risk assessment(s) providing input to the SIL determination. The targeted audience of this guide is the Dutch Process Industry Sector.
Mohamed M. Hassanien has over 15 years of experience as a Technical Manager and OSP Telecom Projects Manager. He has extensive experience designing, installing, and commissioning fiber optic networks for telecom and utility companies. He is proficient in fiber splicing, testing, network design software, and project management. Hassanien holds a B.Sc. in Electronics and Communication Engineering from Helwan University.
This presentation was given at BSides Las Vegas 2015.
The modern times that we live in, the gentle shift that we are making towards the Internet of Things (IoT) is slowly but surely getting a grip on our day to day lives. The same goes for securing our Industrial Control Systems (ICS). We see that the demand for ICS security is raising and governmental regulations are being established and implement. However, this also means that the need for ICS security professionals is raising as well. More and more security professionals/firms are starting to perform security assessments such as penetration testing on an ICS level. Two years ago I got the question if I was up for the challenge, converting myself from a ‘normal’ security professional to a ICS specific security professional.
The purpose of this talk would be to provide a starting point for security professionals that want to make the shift towards ICS Security, just like I did two years ago. While the term starting point might be a bit misleading, the goal would be to provide an ICS 001 talk instead in contrast to an ICS 101 talk.
This document contains the presentation slides from Chris Sistrunk on how to get into ICS security. Some key points:
- The number of security professionals is around 189,000 but those focused on ICS security is under 1,000, only 0.5% of security professionals.
- For those with an OT background, the presenter suggests learning about security fundamentals. For those with an IT background, the presenter suggests learning about operational technology like PLCs and protocols.
- The presenter provides many resources for learning about ICS security including training, conferences, books, and standards. He also suggests ways to build an at-home ICS network lab and get involved in information sharing
The document provides a summary of an automation engineer's skills and experience including:
- Developing SIL 3 safety systems using Yokogawa ProSafe and Schneider Unity Pro SIL 3 PLCs.
- Programming RTUs using SCADAPack Workbench and Twinsoft.
- Creating SCADA applications in Citect and Clear SCADA.
- 5 years of experience in projects involving DCS and PLC systems from Yokogawa, Schneider, and Honeywell.
Dalma Tech2 is a Saudi limited liability company that provides turnkey technical solutions, engineering services, training, and personnel support services to government and commercial clients. It has experience providing services to clients such as the US and Saudi militaries. It is capable of providing services related to security, communications, logistics, and more. Some of its past projects involved supporting radar and network programs for the Saudi and US militaries.
This document discusses five potential nightmares for telecom companies: 1) Gaining physical access to base station networks which could allow accessing clear text login credentials; 2) Exploiting vulnerabilities in Operation Support Systems to retrieve password hashes or gain administrative access; 3) Spoofing GTP packets to activate or delete PDP contexts and potentially steal money; 4) Losing over $1.5 million in a single day by exploiting a VoIP vulnerability to make calls to Cuba; 5) Bypassing CAPTCHAs and installing unauthorized services on user accounts through a self-service portal vulnerability. The document emphasizes that telecom systems are huge and complex with many possible security issues.
The document provides details about Vinayak Devkatte's career objective, personal skills, academic qualifications, and work experience on various projects in Saudi Arabia and India. It summarizes his role in engineering design, configuration, logic development, commissioning, and testing of automation and process control systems incorporating Honeywell and other vendors' controllers, DCS, SCADA, and safety systems for oil, gas, petrochemical and fertilizer plants.
Step Into Security Webinar - Physical Security Integration & Access Control -...Keith Harris
In LENSEC’s Step Into Security webinar, we take a look at integrations for physical security with a special focus on access control. In Part One, we focus on concepts and components.
Recently, access control has made big strides in technology incorporating biometrics, integrating with other security products, and moving to a digital deployment among other things. We'll provide an overview for end-users and security personnel.
LENSEC physical security expert Keith Harris will be presenting this topic. Keith is a veteran expert with extensive knowledge of security equipment. Keith has experience working with educators, law enforcement and others developing security solutions to meet their needs.
Please register for the upcoming webinar. Share this info with your colleagues and invite them to join us.
WEBINAR AGENDA:
• Access Control Deployment
• Building & Fire Codes
• Security Integration
• Choosing Components
Step Into Security Webinar Archive:
http://bit.ly/StepIntoSecurityWebinarArchive
This document provides an overview of CMMC Level 3 and the steps required for compliance. It discusses the CMMC framework including the 17 domains, capabilities, practices, and processes. It identifies the 130 practices required for Levels 1-3. It also outlines some common failures seen in assessments and considerations for costs of compliance. Additionally, it presents 20 key practices to implement for achieving Level 3 and discusses how these practices address requirements in domains like asset management, audit and accountability, incident response, recovery, risk management, security assessment, and system and communication protection. Finally, it provides an overview of the Microsoft cloud platform and how it can help organizations achieve CMMC Level 5 compliance.
Complying with New Functional Safety StandardsDesign World
The document is a presentation on complying with new functional safety standards. It discusses what functional safety is, what is happening in the functional safety market, what standards should be used for machines, and how to determine safety levels and perform calculations according to standards like ISO 13849-1 and IEC 62061. It provides an example of applying the standards to a dual channel emergency stop application and calculating the resulting safety integrity level.
The curriculum vitae outlines Ranjith Kumar's professional experience working on automation projects for various companies in roles such as project engineer, design engineer, and application engineer. It details his educational background and qualifications, including a Bachelor's degree in instrumentation and control, and lists the programming languages, systems, and other tools he has experience with. The CV also provides summaries of several automation projects he has worked on involving systems design, testing, commissioning, and more.
R&D LAB «GTS» provides full-cycle engineering and development services for electronic equipment of any complexity. Their team uses advanced technical solutions and technologies to develop reliable and easy-to-use products that are tested by specialists. They offer services including embedded software development, research and development tasks, industrial design, and more. Their goal is to create market-successful products according to requirements through stages including concept generation, prototyping, and 3D modeling. They have experience with projects including navigation systems, data transmission systems, testing equipment, and security systems.
CONFidence 2015: SCADA and mobile: security assessment of the applications th...PROIDEA
Speakers: Alexander Bolshev, Ivan Iushkevich
Language: English
The days when mobile technologies were just a rising trend have passed, and now mobile devices are an integral part of our life. As a result, you may find them in places where they probably shouldn't be. But convenience often wins over security. Nowadays, you can monitor (or even control!) your ICS (Industrial Control System) from a brand-new Android or iOS smartphone. Just type the words 'HMI', 'SCADA', or 'PLC' into Google Play Store or iTunes App Store, and a surprisingly large bunch of results will appear. Moreover, many of these applications are developed by serious vendors, like Siemens, GE, Omron, etc., and allow accessing, monitoring, or controlling the HMI, PLC, DCS, or SCADA systems in your ICS infrastructure. Are they secure? Could an attacker do something bad if they get access to an industrial engineer's tablet? What kind of vulnerabilities can exist in these applications? What attack vectors are possible?
To answer all these questions, we took a sample of "mobile apps for your SCADA, PLC, HMI" and assessed them. In these talk, found vulnerabilities, attack methods, and other potential risks will be shown. Two attack scenarios will be shown: attacking ICS infrastructure via a compromised smartphone and penetrating mobile devices out of a compromised ICS environment (bottom-to-top attacks). We will discuss whether it is SAFE to allow mobile applications to interact with your ICS infrastructure. Also, the detailed statistics of found flaws and security mechanisms usage will be shown.
CONFidence: http://confidence.org.pl/pl/
- Accomplished project management professional with over 12 years of experience managing security projects including airport security screening systems, CCTV systems, and access control systems.
- Currently a Security Systems Administration Officer at Hamad International Airport, where responsibilities include overseeing security operations, managing projects, and maintaining systems.
- Skilled in all phases of project management, technical support, system installation and maintenance, troubleshooting, and developing documentation.
Abdul Jayfar TMC is a senior project engineer with over 10 years of experience managing security systems projects. He has expertise in access control, CCTV, and integrated security systems. Some of his project experiences include access control systems for petrochemical plants and banks, solar-powered wireless CCTV systems, and queue management systems for government offices. He is proficient in project management, technical installation and configuration, and has security certifications.
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
This webinar will help you get more informed on PenTesting in SCADA and also best practices and methods used on risk assessment. Learning about the criticality in industry, makes you more flexible to boost the skills.
Main points covered:
• The SCADA ICS function in critical infrastructure industry
• Risk exposure of IT vs. SCADA ICS from Cyber Security Perspective
• Do's and don’ts of Vulnerability Assessment and Penetration Testing in SCADA ICS Environment
Presenter:
This webinar was presented by Pedro Putu Wirya, an IT and ICS Security Consultant with an extensive experience in ISMS, and PECB Certified Trainer.
Link of the recorded session published on YouTube: https://youtu.be/icq-RTwusZ8
This document provides an overview of SCADA (Supervisory Control and Data Acquisition) security challenges and strategies. It describes common SCADA system components and functionality. It then discusses increasing cyber threats to SCADA systems from sources like hostile governments and employees. The document outlines various physical and cyber vulnerabilities in SCADA systems and components. It recommends security standards from organizations like NIST, ISA, and NERC to help mitigate risks. The document also provides guidelines on physical asset security and cybersecurity strategies.
1.Car Security
Understanding the Car Onboard Communication / Connection and inherent Security Weakness
2.Addressing the Security Concerns : System’s Viewpoint
Hardware Security Module & Secure Hardware Extension
Look at Software Principle of MAC and Associated Hardware
3.Achieving Security implementation checks via Software and Addressing the Hardware Safety aspect.
Closing the Loop for Security Safeness: Complete Solution to Ensure Security/Safety Compliance with Software
This document provides information about DornerWorks, an engineering firm that specializes in embedded software and electronic hardware design. It details DornerWorks' experience in aerospace projects involving DO-254 standards compliance, including projects for Boeing, Airbus, and Embraer. It describes DornerWorks' staff of over 50 engineers who have experience with FPGA design, VHDL, simulation tools, and executing DO-254 processes. Case studies are presented on projects involving Boeing 787 and Airbus A400 components. Partnerships with certification authorities and manufacturers are also mentioned.
This document provides a summary of Mahmoud Abdelmottaleb Fitaihi's qualifications and experience in industrial automation. It outlines his educational background in communication and electronics engineering and over 8 years of experience designing, implementing, and supporting process control systems using Triconex safety instrumentation systems and DCS platforms. Recent project experience includes roles as lead engineer on expansion projects at Yanbu Refinery and Yanbu Crude Oil Terminal for Saudi Aramco.
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...EnergySec
Presenters: Robert Landavazo, PNM Resources and Katherine Brocklehurst, Tripwire
With countless hours of work to go, PNM was far from ready for its coming audit in just 18 months. Confidence levels in its existing manual, and incomplete security controls, were at an all-time low; and the visibility into control center environments for quantifying its status and progress towards compliance was immeasurable.
With Tripwire, PNM’s preparation of the looming CIPv3 audit noticeably improved. With efficient reporting and automation, PNM’s now positioned to hold itself accountable for CIP auditable compliance of more than 3,500 explicit and supporting control points, satisfying CIP-002-3, CIP-004-3, CIP-005-3, CIP-007-3 and CIP-009-3. In addition, enhanced visibility and better control gave PNM the ability to effectively communicate meaningful and measurable initiatives to executive teams – resulting in increased support for their funding needs.
In this session, PNM – New Mexico’s largest electricity provider – will share a case study on its journey towards achieving continuous NERC CIP compliance despite a highly limited headcount, how it saved countless hours of labor-intensive manual effort, and the essential role that automation played in its success.
This position paper of the SIL Platform (www.nen.nl) indicates that it is common practice to operate process plants at maximum performance, optimum capacity and minimum risk levels. A Safety Integrity Level (SIL) is often determined through e.g. a Layer of Protection Analysis (LOPA) [1] [2]
[3], which is a means to quantify risks. However, LOPA is usually not the starting point for quantifying risks. This is often done with the use of a Risk Assessment Matrix (RAM). Contrary to LOPA and SIL, the use and type of RAM is not clearly pre-scribed or defined.
The intention of this guide is to provide guidance on RAM and show the relations between RAM, LOPA and SIL levels. What are the pitfalls? What is usually applied? What is often missed? It is not the intention to explain in detail the various available risk assessment techniques.
How to arrive at a SIL level in the correct manner leading to a qualitatively proper design and implementation is described in the EN-IEC 61511 standard [4]. Achieving a SIL requires amongst other aspects:
Correct identification of Safety Instrumented Functions (SIF)
Correct determination of required SIL rating of the various SIFs.
This guide strives to improve this quality by improving the quality of the risk assessment(s) providing input to the SIL determination. The targeted audience of this guide is the Dutch Process Industry Sector.
Mohamed M. Hassanien has over 15 years of experience as a Technical Manager and OSP Telecom Projects Manager. He has extensive experience designing, installing, and commissioning fiber optic networks for telecom and utility companies. He is proficient in fiber splicing, testing, network design software, and project management. Hassanien holds a B.Sc. in Electronics and Communication Engineering from Helwan University.
This presentation was given at BSides Las Vegas 2015.
The modern times that we live in, the gentle shift that we are making towards the Internet of Things (IoT) is slowly but surely getting a grip on our day to day lives. The same goes for securing our Industrial Control Systems (ICS). We see that the demand for ICS security is raising and governmental regulations are being established and implement. However, this also means that the need for ICS security professionals is raising as well. More and more security professionals/firms are starting to perform security assessments such as penetration testing on an ICS level. Two years ago I got the question if I was up for the challenge, converting myself from a ‘normal’ security professional to a ICS specific security professional.
The purpose of this talk would be to provide a starting point for security professionals that want to make the shift towards ICS Security, just like I did two years ago. While the term starting point might be a bit misleading, the goal would be to provide an ICS 001 talk instead in contrast to an ICS 101 talk.
This document contains the presentation slides from Chris Sistrunk on how to get into ICS security. Some key points:
- The number of security professionals is around 189,000 but those focused on ICS security is under 1,000, only 0.5% of security professionals.
- For those with an OT background, the presenter suggests learning about security fundamentals. For those with an IT background, the presenter suggests learning about operational technology like PLCs and protocols.
- The presenter provides many resources for learning about ICS security including training, conferences, books, and standards. He also suggests ways to build an at-home ICS network lab and get involved in information sharing
The document provides a summary of an automation engineer's skills and experience including:
- Developing SIL 3 safety systems using Yokogawa ProSafe and Schneider Unity Pro SIL 3 PLCs.
- Programming RTUs using SCADAPack Workbench and Twinsoft.
- Creating SCADA applications in Citect and Clear SCADA.
- 5 years of experience in projects involving DCS and PLC systems from Yokogawa, Schneider, and Honeywell.
Dalma Tech2 is a Saudi limited liability company that provides turnkey technical solutions, engineering services, training, and personnel support services to government and commercial clients. It has experience providing services to clients such as the US and Saudi militaries. It is capable of providing services related to security, communications, logistics, and more. Some of its past projects involved supporting radar and network programs for the Saudi and US militaries.
This document discusses five potential nightmares for telecom companies: 1) Gaining physical access to base station networks which could allow accessing clear text login credentials; 2) Exploiting vulnerabilities in Operation Support Systems to retrieve password hashes or gain administrative access; 3) Spoofing GTP packets to activate or delete PDP contexts and potentially steal money; 4) Losing over $1.5 million in a single day by exploiting a VoIP vulnerability to make calls to Cuba; 5) Bypassing CAPTCHAs and installing unauthorized services on user accounts through a self-service portal vulnerability. The document emphasizes that telecom systems are huge and complex with many possible security issues.
The document provides details about Vinayak Devkatte's career objective, personal skills, academic qualifications, and work experience on various projects in Saudi Arabia and India. It summarizes his role in engineering design, configuration, logic development, commissioning, and testing of automation and process control systems incorporating Honeywell and other vendors' controllers, DCS, SCADA, and safety systems for oil, gas, petrochemical and fertilizer plants.
Step Into Security Webinar - Physical Security Integration & Access Control -...Keith Harris
In LENSEC’s Step Into Security webinar, we take a look at integrations for physical security with a special focus on access control. In Part One, we focus on concepts and components.
Recently, access control has made big strides in technology incorporating biometrics, integrating with other security products, and moving to a digital deployment among other things. We'll provide an overview for end-users and security personnel.
LENSEC physical security expert Keith Harris will be presenting this topic. Keith is a veteran expert with extensive knowledge of security equipment. Keith has experience working with educators, law enforcement and others developing security solutions to meet their needs.
Please register for the upcoming webinar. Share this info with your colleagues and invite them to join us.
WEBINAR AGENDA:
• Access Control Deployment
• Building & Fire Codes
• Security Integration
• Choosing Components
Step Into Security Webinar Archive:
http://bit.ly/StepIntoSecurityWebinarArchive
This document provides an overview of CMMC Level 3 and the steps required for compliance. It discusses the CMMC framework including the 17 domains, capabilities, practices, and processes. It identifies the 130 practices required for Levels 1-3. It also outlines some common failures seen in assessments and considerations for costs of compliance. Additionally, it presents 20 key practices to implement for achieving Level 3 and discusses how these practices address requirements in domains like asset management, audit and accountability, incident response, recovery, risk management, security assessment, and system and communication protection. Finally, it provides an overview of the Microsoft cloud platform and how it can help organizations achieve CMMC Level 5 compliance.
Complying with New Functional Safety StandardsDesign World
The document is a presentation on complying with new functional safety standards. It discusses what functional safety is, what is happening in the functional safety market, what standards should be used for machines, and how to determine safety levels and perform calculations according to standards like ISO 13849-1 and IEC 62061. It provides an example of applying the standards to a dual channel emergency stop application and calculating the resulting safety integrity level.
The curriculum vitae outlines Ranjith Kumar's professional experience working on automation projects for various companies in roles such as project engineer, design engineer, and application engineer. It details his educational background and qualifications, including a Bachelor's degree in instrumentation and control, and lists the programming languages, systems, and other tools he has experience with. The CV also provides summaries of several automation projects he has worked on involving systems design, testing, commissioning, and more.
R&D LAB «GTS» provides full-cycle engineering and development services for electronic equipment of any complexity. Their team uses advanced technical solutions and technologies to develop reliable and easy-to-use products that are tested by specialists. They offer services including embedded software development, research and development tasks, industrial design, and more. Their goal is to create market-successful products according to requirements through stages including concept generation, prototyping, and 3D modeling. They have experience with projects including navigation systems, data transmission systems, testing equipment, and security systems.
CONFidence 2015: SCADA and mobile: security assessment of the applications th...PROIDEA
Speakers: Alexander Bolshev, Ivan Iushkevich
Language: English
The days when mobile technologies were just a rising trend have passed, and now mobile devices are an integral part of our life. As a result, you may find them in places where they probably shouldn't be. But convenience often wins over security. Nowadays, you can monitor (or even control!) your ICS (Industrial Control System) from a brand-new Android or iOS smartphone. Just type the words 'HMI', 'SCADA', or 'PLC' into Google Play Store or iTunes App Store, and a surprisingly large bunch of results will appear. Moreover, many of these applications are developed by serious vendors, like Siemens, GE, Omron, etc., and allow accessing, monitoring, or controlling the HMI, PLC, DCS, or SCADA systems in your ICS infrastructure. Are they secure? Could an attacker do something bad if they get access to an industrial engineer's tablet? What kind of vulnerabilities can exist in these applications? What attack vectors are possible?
To answer all these questions, we took a sample of "mobile apps for your SCADA, PLC, HMI" and assessed them. In these talk, found vulnerabilities, attack methods, and other potential risks will be shown. Two attack scenarios will be shown: attacking ICS infrastructure via a compromised smartphone and penetrating mobile devices out of a compromised ICS environment (bottom-to-top attacks). We will discuss whether it is SAFE to allow mobile applications to interact with your ICS infrastructure. Also, the detailed statistics of found flaws and security mechanisms usage will be shown.
CONFidence: http://confidence.org.pl/pl/
- Accomplished project management professional with over 12 years of experience managing security projects including airport security screening systems, CCTV systems, and access control systems.
- Currently a Security Systems Administration Officer at Hamad International Airport, where responsibilities include overseeing security operations, managing projects, and maintaining systems.
- Skilled in all phases of project management, technical support, system installation and maintenance, troubleshooting, and developing documentation.
Abdul Jayfar TMC is a senior project engineer with over 10 years of experience managing security systems projects. He has expertise in access control, CCTV, and integrated security systems. Some of his project experiences include access control systems for petrochemical plants and banks, solar-powered wireless CCTV systems, and queue management systems for government offices. He is proficient in project management, technical installation and configuration, and has security certifications.
A competent professional with 5 years of experience in:
Project Management Operations & Maintenance Installation & Commissioning
Testing & Inspection Safety Compliance Vendor Management
Manpower Planning Cost Control Reporting & Documentation
• Currently associated with L&T Construction (Smart World Communication- IC), Chennai as Senior Engineer (Electrical)
• Expertise in proactively identifying & resolving problems, ramping up project activities with on time deliverables; maximizing efficiency; maintaining flow of work between department
John kingsley OT ICS SCADA Cyber security consultantJohn Kingsley
John kingsley OT ICS SCADA Cyber security consultant
SCADA ICS Security Courses
Lack of SCADA ICS security professionals that lead to big gaps between compliance against the respected guidelines with the real situation at site. Critical needs for proper security professional in SCADA ICS
SCADA ICS Security Assurance
Ensuring the SCADA ICS environment to comply with the security requirements in order to maintain the production operations and sustain the business performance
SCADA ICS (OT) Security Services
SCADA ICS Security Services Summary
SCADA ICS Security Asset Management
SCADA ICS Security Risk Management
SCADA ICS Security Assessment
SCADA ICS Standard, Policy & Procedure Management
SCADA ICS Security Implementation
Cyber Security Services
Vulnerability Assessment
Penetration Testing
ISO 27001 Certified Management System Audit
Mahesh Vala has over 9 years of experience as a Project Engineer specializing in IT, networking, and security projects. He has extensive experience managing large scale CCTV surveillance projects, including over 500 cameras for Ahmedabad Municipal Corporation. He is proficient in video management software, IP and analog camera installation, networking equipment configuration, and troubleshooting IT and networking issues. He holds a B.E. in Electronics and Communications and seeks a position that utilizes his technical skills and experience managing projects.
The document provides a summary and work experience for Rehan Ansari. It outlines his experience as a CCTV camera technician and production supervisor in Pakistan for over 4 years. It also lists his academic credentials including a pending B.Com degree from Karachi University and certifications in networking, Windows, and information technology. His skills include CCTV camera operation, networking, software installation, and computer repair.
The document provides a summary and work experience for Rehan Ansari. It outlines his experience as a CCTV camera technician and production supervisor in Pakistan for over 4 years. It also lists his academic credentials including a pending B.Com degree from Karachi University and certifications in networking, Windows, and information technology. His skills include CCTV camera operation, networking, software installation, and computer repair.
Amit Kumar Bharti has over 12 years of experience in airport security systems design, estimation, and implementation. He currently works as a Design Manager for Bayanat Airports Engineering & Supplies LLC in Abu Dhabi. He has extensive experience designing, estimating, and managing projects for CCTV, access control, intruder alarms, cabling, and other airport systems. He holds several industry certifications and has managed large projects in the Middle East and India.
This resume summarizes Arslan Kalam's career objective and qualifications. He has over 9 years of experience in IT, networking, CCTV installation and maintenance. His experience includes roles as an Assistant Network Administrator, Senior I.T Support Engineer, CCTV Control Room Operator and Biomedical Technician. He has strong skills in networking, Windows OS, video management systems, and repairing various electronics equipment.
Finto Thomas is an Information Technology Security Consultant with over 8.5 years of experience advising large businesses and Fortune 500 companies. He has expertise in network and security architectural design, implementation, and review. Some of his skills include cyber threat intelligence, penetration testing, firewall configuration, and cloud/mobile security. He is certified in CISSP, several Cisco certifications, ITIL, and IBM Qradar. He has worked as a Project Manager at IBM India and held security roles at Wipro and Trimax Data Centre.
This document is a resume for Farook Suleman, a CCTV engineer based in Abu Dhabi, UAE. It outlines his 11 years of experience in CCTV and security systems design, including 7 years working on bank projects in Saudi Arabia and with the Department of Transport in Abu Dhabi. His skills include installing, configuring, and maintaining IP cameras, access control systems, video management software, and more. Currently he works as a CCTV engineer for Multinet IT Solutions in Abu Dhabi, where he has managed several projects for government clients.
Dinesh Pardeshi has over 12 years of experience in project engineering and management roles related to security, communication, CCTV, access control, and fire alarm systems. He currently works as an Electronics Engineer at Hamad International Airport in Qatar, where he is responsible for supervising technical and maintenance employees and assisting with development and implementation of plans and policies for various systems. Previously he has served as a Superintendent for a construction company in Saudi Arabia managing installation projects for CCTV, access control, fire alarm and other systems. He also has experience as a Project Lead for an IT company in India implementing low voltage systems.
Vivek has his college degree in Computer Science and Engineering. With his strong background in Algorithms and Software Development, Web Development, Graphics Designing ,Internet Marketing, Cyber Security and also in Electronic security and Embedded systems in combination with his inter-personal skills and in-depth knowledge of current research in these fields.
http://www.vivek-chan.in
This document contains a resume for Murari Kumar Choudhary seeking a position as a technical support engineer. It lists his contact information and over 5 years of relevant experience in roles supporting data center operations, server and network maintenance, desktop support, and troubleshooting various software and hardware issues. It also provides details of his technical skills and qualifications, including various networking, operating system, software, and IT certification.
This document contains the resume of Syed Sirajuddin, an IT professional with over 20 years of experience in server administration, networking, hardware installation, data backup and security. He has worked as an IT infrastructure specialist and manager for various telecommunications and IT companies in Dubai and India. His technical skills include Windows, Linux, Unix administration, virtualization, backup solutions, firewalls, networking and security. He holds several professional certifications and seeks a senior IT role in a progressive enterprise.
John Battersby has extensive experience in automation control, SCADA, and software development. He has owned his own software consulting company for over 20 years, developing customized applications using technologies like .NET, HMI packages, PLC programming, and database design. Some of his past clients include ALCOA, Bombardier Transportation, and US Steel. He is looking for a new opportunity that allows him to leverage his experience helping customers solve problems through software solutions.
The document is a curriculum vitae for Arslan Sheikh that summarizes his career experience and qualifications. It details over 9 years of experience in network administration, CCTV installation and support, and IT support roles. It also lists his education qualifications in electronics and provides contact information.
Mohammed Kareem Uddin has over 18 years of experience in IT and security administration. He has specialized skills in Cambium Network Products, Motorola Tetra systems, wireless networks, and CCTV equipment. He seeks a challenging career opportunity where he can utilize his extensive experience in areas like IT security, network administration, and telecommunications systems.
The document provides a curriculum vitae for Parimal P. Thakkar, who has over 10 years of experience in desktop and client server application development using technologies like .NET, SQL Server, and VB. He has worked as a team leader and module leader on various projects in companies like SciTER Technologies, CIMCON Software, and Aruhat Technologies. The CV lists his technical skills, work experience on different projects, educational qualifications, achievements, and strengths.
Ahmed Barakat Abdel Baky Sonbol has over 15 years of experience in information technology and security. He received a BSC in electronics and communication engineering from Ain Shams University in 2001. He has held several leadership roles in IT security and has extensive technical training and certifications in networking, security, and project management. Currently, he is the IT Information Security Head at Abu Dhabi Islamic Bank where he manages security projects and assesses risks.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Climate Impact of Software Testing at Nordic Testing Days
Kaustubh updated resume 2020-june
1. KAUSTUBH SANJAY KOTHIWAN
Mobile: +974-33448420
E-Mail: kaustubhk19@gmail.com / kaustubhkothiwan@yahoo.in
PASSPORT NUMBER: J6279931
PMP® Number: 2767350
PROFESSIONAL PROFILE
A competent project management professional with 12 years of experience in Project
management of Airport Security Screening Equipment’s, Physical Security Systems,
Network & Data Centre Administration.
currently associated with Hamad International Airport, AS Security Systems
Administrator Officer
SUMMARY
Current Involvement:
Involved in Project management of NEOS (New Era of Security), ACI’s Airport
Smart Security concept.
Handled the POC of Rohde & Schwarz Quick Personnel Security Scanner QPS-200, QPS-201.
Smith’s detection X-ray C2 Software.
Smith’s detection ETD-500DT, ETD-600, L-3 communication ETD- QS-B220.
Human Security Radar by APSTEC.
HBS and OOG system of BHS.
IPSOTEK video Analytics configuration and testing.
Vanderlande and Smith’s detection X-ray I-lane concept testing.
CASRA XRT4 CBT tool expert
CTX machine testing
SKILLS
SOFT SKILLS TECHNICAL SKILLS PROJECT MANAGEMENT
SKILLS
Team Work Indigo-Vision Administrator Project Management of ACI
Smart Security Concepts
Leadership UTC FCWNX and VSC
Administrator
Project Management of Airport
Security Operations
Corporate Behavior VB IT Project Management
Change & Innovation MS Office Expert Documents making skills
Service Delivery Excel Macros Expert Vendor Management
Time Management ITIL V3 Stakeholder’s Management
Strong Organizational Skills CCNA Deadline Driven
Strong interpersonal Skills System Development Timely Project Completion
Solid Communication skills UAT TestingPlanning Employee Productivity Reports
Adaptable Power BI Establishing goals and setting
priorities
2. EXPERIENCE
PERIOD ROLE COMPANY NAME
2017 – Till now Security Systems Administration Officer Hamad International Airport
2013 - 2017 TS – Engineer (IT) Hamad International Airport
2012 - 2013 IT Consultant Qatar Airways
2012 - 2012 Network Support Engineer L-2 Polaris Financial Technology
2011 - 2012 Network Support Engineer L-2 IBM India Pvt. Ltd.
2010 - 2011 Assistant Engineer 3I InfoTech Pvt. Ltd.
2009 - 2010 Electronics Engineer Spruha Electronics Systems
CAREER HIGHLIGHTS
Aug, 17 – Till now, Security Systems Administration Officer
Hamad International Airport, Doha, Qatar
Actively involved in project management of ACI’s Smart Security Projects such as Landside
and
Airside Security majors.
Rohde & Schwarz Quick personnel scanner QPS-200, QPS-
201. APSTEC HSR Human Security Radar
Smith’s Detection ETD 600 and ETD-500DT
Smith’s Detection X-ray Software C2
IPSOTEK video Analytics configuration and testing
Vanderlande and Smith’s detection X-ray I-lane concept testing.
All the Airport Security Systems projects has been handled and delivered in time, with appreciation.
Skills in project documents making and reports.
Involved in gap analysis projects of Airport CCTV installation of 1100 new smart technology
cameras with video analytics concept.
I have made the 5 new macros based application to capture the manual data during the POC of
QPS- 201, all these applications were based on Visual basics programming.
Responsible of follow up with different projects status on the sites according to the projects plans.
Installation of CCTV cameras (Box, Dome, PTZ etc.).
Installation of Biometric Access Control systems and Access Control System
Assembling of NVRs & installation of OS in NVRs
Actively involved in creation of access rights and rezoning of access rights in the access
control system.
Handling FCWNX and Indigo vision.
Handling different stakeholders of Qatar Airways, Customs & MOI Operators.
Configuring different alert alarms for doors.
Site surveys and provide sales engineering support, including collecting and recording detailed
operational, functional and technical requirements, developing project scopes, and providing overall
system costing for Access Control & CCTV projects.
Understanding plans and specifications to identify the types and grades of materials and
equipment needed to ensure compliance with project requirements.
Knowledge of design techniques, tools, and principals involved in the production of security
plans, blueprint and drawings developing specific goals and plans to prioritize, organize, and
accomplish Work.
Corrective Maintenance and Troubleshooting of the faults happened in cameras and Access control
Systems.
Prepare, monitor and report on all planned preventative maintenance (PPMs) for all security
systems
CCTV, Access Control, Barriers, and Fingerprint Time & Attendance Systems.
3. Installation and maintenance/work records detailing of all activities carried out on site which
include drawings, O&Ms, Reports, Task sheets, Completion certificates, Accident and Incident
Reports etc.
Aug, 13 – Apr, 17, Technology Service - Engineer
Doha International Airport, Doha, Qatar
Responsible of follow up with different projects status on the sites according to the projects plans.
Installation of CCTV cameras (Box, Dome, PTZ)
Installation of Biometric Access Control systems.
Assembling of NVRs & installation of OS in NVRs
Installing Networks (LAN).
Installation of different types of CCTV cameras as per drawing
diagrams. Troubleshooting of NVRs & cameras.
Handling FCWNX and Indigo vision.
Tech support for Qatar Airways, HIA & MOI Operators.
Configuring different alert alarms for doors.
Site surveys and provide engineering support, including collecting and recording detailed
operational, functional and technical requirements, developing project scopes, and providing
overall system costing for Access Control & CCTV projects.
Understanding plans and specifications to identify the types and grades of materials and
equipment needed to ensure compliance with project requirements.
Knowledge of design techniques, tools and principals.
Involved in the production of security plans, blueprint and drawings developing specific goals
and plans to prioritize, organize, and accomplish work.
Corrective Maintenance and Troubleshooting of the faults happened in cameras and Access control
Systems.
Prepare, monitor and report on all planned preventative maintenance (PPMs) for all security
systems
CCTV, Access Control, Barriers, and Fingerprint Time & Attendance Systems.
Installation and maintenance/work records detailing of all activities carried out on site which
include drawings, O&Ms, Reports, Task sheets, Completion certificates, Accident and Incident
Reports etc.
July, 12 – July, 13 IT CONSULTANT (Doha, Qatar)
Polaris Financial technology, MUMBAI ON CLIENT SITE Qatar Airways, Doha, Qatar
Design, installation, configuration, integration, testing and Maintenance of CCTV and Access
Control System, Barriers and other Security Systems.
Working with LENEL Application System by Configuring On guard
Software, Monitoring the Alarm Systems.
Site surveys and provide sales engineering support, including collecting and recording
detailed operational, functional and technical requirements, developing project scopes, and
providing
Overall system costing for Access Control & CCTV projects.
Understanding plans and specifications to identify the types and grades of materials
and equipment needed to ensure compliance with project requirements.
Corrective Maintenance and Troubleshooting of the faults happened in cameras and Access control
Systems.
Prepare, monitor and report on all planned preventative maintenance (PPMs) for all
security systems CCTV, Access Control, Barriers, and Fingerprint Time & Attendance
Systems.
Installation and maintenance/work records detailing of all activities carried out on site which
include drawings, O&Ms, Reports, Task sheets, Completion certificates, Accident and Incident
Reports etc.
4. Jan, 12 – July, 12 NETWORK SUPPORT ENGINEER LEVEL-2. (NAVI MUMBAI, Kharghar)
Polaris Financial technology, MUMBAI ON CLIENT SITE RBI, Data center
Implement Configuring & Managing Cisco switches7600, 6500, 2950, 2960, 3560E, 3560C, 3750
series.
Implement Configuring & Managing Cisco routers 3800, 2900, 1800 series.
Maintaining Inventory of all IT equipment’s.
Made Network Infrastructure Document for CBS Project for 3 sites Mumbai, New
Mumbai and Nagpur.
Daily backup of Cisco LMS, WCS, ACS, Routers, Switches & Call Manager.
Providing technical support for the maintenance of LAN, WAN, Routers and access switches &
Wireless.
Monitor Internet, Point to Point, PRI.
Performance analysis and Diagnosis of day to day networking problems and Reporting.
Maintaining Change Management, Incident, Problem, daily checklist & Service call report.
Create and troubleshooting VLAN, Trunk, STP, SNMP, access-list and IP route.
Configured, Authentication and Maintenance Wireless controller 5508 and access point 1252
Handled and Wireless control system.
Responsibility involves Maintenance of Call Manager, Technical Support & Co-ordinate with service
provider.
Configuration and Maintenance of VOIP network & Internet Cisco IP Phones series 6921.
Hands-on experience of troubleshooting Cisco Call Manager to enable features and services to
include
Call route Partition, Speed dials, Call Park, Call Pickup, Call Forward all…
Managing Customer’s network using NMS like Cisco Works-LMS and WCS
Maintaining Change Management & Incident and Problem Management database, daily checklist
and service call report.
Configuration & password management of network devices using Network Management Software
ACS.
Performance analysis and Diagnosis of day to day networking problems and Reporting.
Internally escalating problems as well as externally wherever necessary in order to meet SLAs.
Providing the maintenance of LAN, WAN, Routers, access switches, wireless and VOIP.
Aug, 11 - Dec’11 NETWORK SUPPORT ENGINEER LEVEL-2. (NAVI MUMBAI, PANVEL)
IBM INDIA PVT LTD, MUMBAI (OFF ROLE) ON CLIENT SITE ARSHIYA INTERNATIONAL LTD.
Configuring & Managing Cisco switches 6500, 2950, 2960, 3560E, 3560C series.
Configuring & Managing Cisco routers 3800, 2900, 1800 series.
Configuring EIGRP, OSPF, RIP & STATIC ROUTING.
Maintaining Inventory of all IT equipment’s.
Daily backup of Cisco LMS, WCS, ACS, Routers, Switches & Call Manager.
Providing technical support for the maintenance of LAN, WAN, Routers and access switches &
Wireless.
Monitor Internet, Point to Point, PRI.
Performance analysis and Diagnosis of day to day networking problems and Reporting.
Maintaining Change Management, Incident, Problem, daily checklist & Service call report.
Create and troubleshooting VLAN, Trunk, STP, SNMP, access-list and IP route.
Configured, Authentication and Maintenance Wireless controller 5508 and access point 1252
Handled and Wireless control system.
Responsibility involves Maintenance of Call Manager, Technical Support & Co-ordinate with service
provider.
Configuration and Maintenance of VOIP network & Internet Cisco IP Phones series 6921.
Hands-on experience of troubleshooting Cisco Call Manager to enable features and services to
include
Call route Partition, Speed dials, Call Park, Call Pickup, Call Forward all…
Managing Customer’s network using NMS like Cisco Works-LMS and WCS
Maintaining Change Management & Incident and Problem Management database, daily checklist
and service call report.
Configuration & password management of network devices using Network Management Software
5. ACS.
Performance analysis and Diagnosis of day to day networking problems and Reporting.
Internally escalating problems as well as externally wherever necessary in order to meet SLAs.
Providing the maintenance of LAN, WAN, Routers, access switches, wireless and VOIP
Oct’10 - Aug'11 ASSISTANT ENGINEER FOR NETWORK SUPPORT. (GONDIA)
3I INFOTECH PVT. LTD., MUMBAI (POSTING AT GONDIA) NETWORK LEVEL - 1
LAN and wan management.
I know the entire configuration done at the router end.
Configuration of OSPF, RIP v1, rip v2, IGRP, EIGRP.
VLAN, loopback interface and route summarization.
Antivirus up gradation on all machines troubleshooting of virus problems.
Testing links by giving local loop and remote loop.
Creating new LANs using hubs.
Managing all lease lines of 34mbps total speed.
Used GNS3 & Cisco packet tracer 5.5 for R&D.
We were managing 1 router of ASR 1002 series all configuration done by NOC Team.
Switch 3560E 24 ports for distribution and 3560E 48 ports for access.
Total 17 3560 Switches connected at each department of Collector Office.
As one uplink connected from 3560E 24 ports to 3560E 48 ports.
Routing protocol was BGP.
All Network Documentation done by our team in that I played major role.
Coordinate with Service provider & give complete Technical Support.
Daily Monitoring devices and made Service Call report of Links.
Daily Network Device Health Check report.
Also Search any updated IOS is available, if then maintain report and Send to TL.
Any activity maintains Plan of Action & also made configuration script.
June’09 – Oct’10 Network & Electronics Support ENGINEER (NAGPUR)
SPRUHA ELECTRONICS SYSTEM, Nagpur
Visual Basics
Microsoft Excel and macros
AutoCAD
Assembling and reassembling of computer peripherals.
PCB designing by using ORCAD.
All type of circuit testing.
Handling product marketing.
Making all technical information booklets of products.
Done coding for moving display which is used at railway platforms.
Made production information display for ISPAT, SUNFLAG.
Troubleshooting all circuits’ problems.
Work on different sites for troubleshooting the problems.
Done soldering and DE soldering when troubleshooting any device.
Working on all types of moving electronics display.
Expert in system installation, configuration, administration, and integration.
Analytical and technical expertise.
Expert in network operations.
Creative, curious, analytical, and detail-oriented.
Interactive ability and target centric
6. EDUCATION
B.E (Electronics Engineering) Nagpur University, Nagpur
[65.81%]
2009
H.S.C (12th class) Maharashtra board
[75.50%]
2004
S.S.C (10th class) Maharashtra board 2002
[72.29%]
PERSONAL DETAILS
Name : Kaustubh S. Kothiwan
Father’s Name: Sanjay M. Kothiwan
Date of Birth : 19 Dec, 1986
Marital Status: Married
Permanent Add: Plot No 19, Vastu Swapna Apts., Navnirman colony, Pratap Nagar, Nagpur. 440022
The above mentioned details are true to the best of my knowledge.
Signature:
Date: Kaustubh Sanjay Kothiwan