SlideShare a Scribd company logo
Vijay Navgire
+91 9082992866 (cell)
vijay.navgire@outlook.com
https://www.linkedin.com/in/vijaynavgire9/
Professional Profile
Diligent IT professional accustomed in providing exceptional infrastructure support in 24x7 environments to Banking,
Analytics, Insurance corporations of multiple continents.
My experience in Network and Security Operation Centers has helped me to hone my skills of troubleshooting issues
within production networks and mitigating security risks associated. I am proven in my ability to configure and
manage network devices for global companies and streamline intricate recurring tasks in all my roles.
Core Skills
• Log Analysis • Incident/event analysis • DLP administration
• Troubleshooting connectivity • Firewall Administration • DDoS prevention
• Monitoring • Compliance Auditing
• Packet Capture • Antivirus Administration
Career Summary
November 2019- Present
NTT
Senior Engineer – Security Practice (Level 2)
Key Responsibilities:
• Administration of multi-tier network security infrastructure for pan-India and multi-national clients
• Auditing, configuring, fine-tuning of security policies applied across network devices under infra-
management
• Drive scheduled meetings/ troubleshooting sessions with OEM TAC/ clients for resolving problems
and incidents
• Adopting and augmenting newer network security elements for efficient functioning and securing client
infrastructure from zero-day attacks/ vulnerabilities
• Following ITIL procedures for change/ incident management efficiently
• Configuring and monitoring DDoS protection service to observe and mitigate any ongoing/ foreseen
DDoS attack
• Creation of SOP, KB documents and driving knowledge sharing among all stakeholders responsible
for managing client infrastructure
March 2018- October 2019
Paladion Networks
Analyst – Infrastructure Security (Level 2)
Key Responsibilities:
• Carried out high level analysis on security data to identify significant activity.
• Promulgate detailed status updates on existing cyber security incidents daily to include follow up
with client/customer to ensure satisfactory resolution.
• Coordinating with SMEs to implement changes within the security infrastructure.
• Generate detailed security incident reports and disseminate the reports in accordance with incident
response and reporting standard operating procedures.
• Read and understand system data including but not limited to security event logs, system logs, proxy
and firewall logs
October 2016 – Feb 2018
Tikona Infinet Limited
Network Support Engineer
Key Responsibilities:
• Monitoring and resolving all kinds of connectivity problems guaranteeing maximum uptime with
maintained quality of experience
• Updating and installing newer technologies at client-side infrastructure and keeping clients informed of
newer technological trends
• Adopting latest tools and utilities required to keep networks clutter free
• Troubleshooting customer premise equipment to monitor device behavior in multiple scenarios
• Monitoring devices in real time within the network with help of technologies like RFTR, Cambium,
in order to prevent malicious activities
Technical Skills
• Firewalls – ForcePoint, Checkpoint, Fortigate
I. Configuration of ACLs, Application filters, SSL VPN users
II. Configuration of SSL VPNs, VLANs, Static routes
III. Troubleshooting connectivity issues (Inward and outward traffic)
IV. Planning and upgrading firewall to most stable versions
V. Analyze debug logs for utilization related issues
VI. Creation of weekly/ monthly dashboards for analyzing traffic trends
• WAF – Imperva, F5, Akamai KSD
I. Onboarding web applications behind WAF
II. Applying/ renewing SSL certificates for web applications
III. Reporting most frequent signatures triggered and fine tuning them
IV. Planning and upgrading gateways/ management console to most stable versions
V. Enabling learning/ fine tuning of URIs for onboarded applications
• HIPS/DLP – McAfee
I. Configuring relevant policies to safeguard critical user data from unexpected leakage
II. Reporting most frequent signatures triggered and fine tuning them
III. Updating HIPS/ DLP agents to latest stable versions to ensure best compliance practices
• Endpoint Security - Carbon Black, McAfee EPO, Trend Micro, FortiEDR
I. Configuration of security policies on multi-vendor endpoint protection programs
II. Reporting most frequent signatures triggered and fine tuning them
III. Updating endpoint components to latest stable versions to ensure real-time protection
IV. Creating and sharing dashboards for compliance purposes
V. Blocking of IOCs and file hashes based on published security advisory regularly
• Email Protection - Exchange Online Protection
• Proxy - Websense Triton, McAfee
I. Configuring relevant policies to enable filtering of web traffic passing device
II. Whitelist & blacklist URLs/ FQDNs based on reputation checks post following change management
III. Blocking of IOCs (IPs/ FQDNs) based on published security advisory regularly
IV. Creation of specific exceptions for particular user/ group to enable restricted access
Education
• Bachelor of Engineering (Computer Engineering), Saraswati College of Engineering, Kharghar, Navi
Mumbai, (2015) – First Class
• Higher Secondary Certificate, Vani Vidyalaya, Mulund, Mumbai, 2010 - Distinction
• Secondary School Certificate, Wees School, Thane, 2008 – Distinction
Hobbies
• Browsing Networking Forums, pursue online MOOCs, playing piano

More Related Content

What's hot

What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
Mir Mustafa Ali
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
Anthony Daniel
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
primeteacher32
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
F-Secure Corporation
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
ShivamSharma909
 
Security Essentials
Security EssentialsSecurity Essentials
Security Essentials
Ashley Deuble
 
Powerful email protection
Powerful email protectionPowerful email protection
Powerful email protection
F-Secure Corporation
 
Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT security
F-Secure Corporation
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
Cyd Isaak Francisco
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
Amy McMullin
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security Benchmark
Rahul Khengare
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
hoanv
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
Amy McMullin
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
sathiyamaha
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
Solarwinds N-able
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
NetworkCollaborators
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
Narendran Vaideeswaran
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
Amy McMullin
 

What's hot (20)

What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Security Essentials
Security EssentialsSecurity Essentials
Security Essentials
 
Powerful email protection
Powerful email protectionPowerful email protection
Powerful email protection
 
Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT security
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
CIS Security Benchmark
CIS Security BenchmarkCIS Security Benchmark
CIS Security Benchmark
 
Algo sec suite overview 2013 05
Algo sec suite overview 2013 05Algo sec suite overview 2013 05
Algo sec suite overview 2013 05
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
 
Microsegmentation for enterprise data centers
Microsegmentation for enterprise data centersMicrosegmentation for enterprise data centers
Microsegmentation for enterprise data centers
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
 

Similar to Resume | Vijay Navgire

TIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_SecurityTIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_Security
carl yu
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
ImamBahrudin5
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
Muhammad Mudassar
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
Christopher Gerritz
 
Additional Skills
Additional SkillsAdditional Skills
Additional Skills
Ravi Bandekar
 
How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?
IT AMC Support Dubai - Techno Edge Systems LLC
 
Shashikant Chavan_Resume
Shashikant Chavan_ResumeShashikant Chavan_Resume
Shashikant Chavan_Resume
Shashikant Chavan CCNA, C|EH, ITIL V3
 
Girish Dambal Ver 1.1
Girish Dambal Ver 1.1Girish Dambal Ver 1.1
Girish Dambal Ver 1.1
Girish. Dambal
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET Journal
 
Resume
ResumeResume
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
HCLSoftware
 
Minal Wankhede
Minal WankhedeMinal Wankhede
Minal Wankhede
mpatke
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
Hayat Azizi
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
Lancy Menezes
 
FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91
Shanmugavel Sankaran
 
NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResume
Nadia Pryadko
 
Harsha CV
Harsha CVHarsha CV
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
Skybox Security
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
Mark Long
 
Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5
Ifthekharul Islam
 

Similar to Resume | Vijay Navgire (20)

TIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_SecurityTIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_Security
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
Additional Skills
Additional SkillsAdditional Skills
Additional Skills
 
How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?How To Protect Your Network with Firewall Security?
How To Protect Your Network with Firewall Security?
 
Shashikant Chavan_Resume
Shashikant Chavan_ResumeShashikant Chavan_Resume
Shashikant Chavan_Resume
 
Girish Dambal Ver 1.1
Girish Dambal Ver 1.1Girish Dambal Ver 1.1
Girish Dambal Ver 1.1
 
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A ReviewIRJET- Data Security in Local Network through Distributed Firewalls: A Review
IRJET- Data Security in Local Network through Distributed Firewalls: A Review
 
Resume
ResumeResume
Resume
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Minal Wankhede
Minal WankhedeMinal Wankhede
Minal Wankhede
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
 
Lancy-Curriculum Vitae
Lancy-Curriculum VitaeLancy-Curriculum Vitae
Lancy-Curriculum Vitae
 
FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91FixNix vCISO CyberSecurity Network Security for Covid91
FixNix vCISO CyberSecurity Network Security for Covid91
 
NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResume
 
Harsha CV
Harsha CVHarsha CV
Harsha CV
 
5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability5 Steps to Reduce Your Window of Vulnerability
5 Steps to Reduce Your Window of Vulnerability
 
Specialist Security Engineer
Specialist Security EngineerSpecialist Security Engineer
Specialist Security Engineer
 
Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5Resume Of Ifthekharul Islam_2016_V1.5
Resume Of Ifthekharul Islam_2016_V1.5
 

Recently uploaded

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 

Recently uploaded (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 

Resume | Vijay Navgire

  • 1. Vijay Navgire +91 9082992866 (cell) vijay.navgire@outlook.com https://www.linkedin.com/in/vijaynavgire9/ Professional Profile Diligent IT professional accustomed in providing exceptional infrastructure support in 24x7 environments to Banking, Analytics, Insurance corporations of multiple continents. My experience in Network and Security Operation Centers has helped me to hone my skills of troubleshooting issues within production networks and mitigating security risks associated. I am proven in my ability to configure and manage network devices for global companies and streamline intricate recurring tasks in all my roles. Core Skills • Log Analysis • Incident/event analysis • DLP administration • Troubleshooting connectivity • Firewall Administration • DDoS prevention • Monitoring • Compliance Auditing • Packet Capture • Antivirus Administration Career Summary November 2019- Present NTT Senior Engineer – Security Practice (Level 2) Key Responsibilities: • Administration of multi-tier network security infrastructure for pan-India and multi-national clients • Auditing, configuring, fine-tuning of security policies applied across network devices under infra- management • Drive scheduled meetings/ troubleshooting sessions with OEM TAC/ clients for resolving problems and incidents • Adopting and augmenting newer network security elements for efficient functioning and securing client infrastructure from zero-day attacks/ vulnerabilities • Following ITIL procedures for change/ incident management efficiently • Configuring and monitoring DDoS protection service to observe and mitigate any ongoing/ foreseen DDoS attack • Creation of SOP, KB documents and driving knowledge sharing among all stakeholders responsible for managing client infrastructure March 2018- October 2019 Paladion Networks Analyst – Infrastructure Security (Level 2) Key Responsibilities: • Carried out high level analysis on security data to identify significant activity. • Promulgate detailed status updates on existing cyber security incidents daily to include follow up with client/customer to ensure satisfactory resolution. • Coordinating with SMEs to implement changes within the security infrastructure. • Generate detailed security incident reports and disseminate the reports in accordance with incident response and reporting standard operating procedures. • Read and understand system data including but not limited to security event logs, system logs, proxy and firewall logs
  • 2. October 2016 – Feb 2018 Tikona Infinet Limited Network Support Engineer Key Responsibilities: • Monitoring and resolving all kinds of connectivity problems guaranteeing maximum uptime with maintained quality of experience • Updating and installing newer technologies at client-side infrastructure and keeping clients informed of newer technological trends • Adopting latest tools and utilities required to keep networks clutter free • Troubleshooting customer premise equipment to monitor device behavior in multiple scenarios • Monitoring devices in real time within the network with help of technologies like RFTR, Cambium, in order to prevent malicious activities Technical Skills • Firewalls – ForcePoint, Checkpoint, Fortigate I. Configuration of ACLs, Application filters, SSL VPN users II. Configuration of SSL VPNs, VLANs, Static routes III. Troubleshooting connectivity issues (Inward and outward traffic) IV. Planning and upgrading firewall to most stable versions V. Analyze debug logs for utilization related issues VI. Creation of weekly/ monthly dashboards for analyzing traffic trends • WAF – Imperva, F5, Akamai KSD I. Onboarding web applications behind WAF II. Applying/ renewing SSL certificates for web applications III. Reporting most frequent signatures triggered and fine tuning them IV. Planning and upgrading gateways/ management console to most stable versions V. Enabling learning/ fine tuning of URIs for onboarded applications • HIPS/DLP – McAfee I. Configuring relevant policies to safeguard critical user data from unexpected leakage II. Reporting most frequent signatures triggered and fine tuning them III. Updating HIPS/ DLP agents to latest stable versions to ensure best compliance practices • Endpoint Security - Carbon Black, McAfee EPO, Trend Micro, FortiEDR I. Configuration of security policies on multi-vendor endpoint protection programs II. Reporting most frequent signatures triggered and fine tuning them III. Updating endpoint components to latest stable versions to ensure real-time protection IV. Creating and sharing dashboards for compliance purposes V. Blocking of IOCs and file hashes based on published security advisory regularly • Email Protection - Exchange Online Protection • Proxy - Websense Triton, McAfee I. Configuring relevant policies to enable filtering of web traffic passing device II. Whitelist & blacklist URLs/ FQDNs based on reputation checks post following change management III. Blocking of IOCs (IPs/ FQDNs) based on published security advisory regularly IV. Creation of specific exceptions for particular user/ group to enable restricted access Education • Bachelor of Engineering (Computer Engineering), Saraswati College of Engineering, Kharghar, Navi Mumbai, (2015) – First Class • Higher Secondary Certificate, Vani Vidyalaya, Mulund, Mumbai, 2010 - Distinction • Secondary School Certificate, Wees School, Thane, 2008 – Distinction Hobbies • Browsing Networking Forums, pursue online MOOCs, playing piano