SlideShare a Scribd company logo
Rohit Mann
rohit09@umd.edu, Pho ne:(301)-302-5298, Address: 3407, Tulane Drive, Apt.# 11, Hyattsville, Maryland 20783
EDUCATION
 M.S inTelecommunications
University of Maryland
May - 2016
GPA:3.45/4
 B.Tech,ElectronicsandCommunication
Amity University,Noida, India
April - 2013
CGPA:6.5/10
COURSEWORK
1) Networks and protocols 2)Cyber security 3) Cryptography 4) Cloud Computing
5) AWS-PCS System Implementation.
TECHNICALSKILLS
 NetworkProtocols:TCP/IP,UDP,DHCP,DNS,NAT, RIP,OSPF, BGP,EIRP,and HTTPS.
 SecurityTechnologies:Public-Privatekey encryption,SSL, AES, DES, RSA Algorithms.
 WirelessTechnologies:UMTS, LTE, 802.11(a, b, g, n, ac).
 Tools:WireShark, BMC-BPPM Network Management Tool, BMC- Remedy Ticketing Tool, Mentum
Planet, Eclipse, GNS3
 Programming skills: Python, Java.
 Operating Systems: Windows,Linux, Mac OS
INDUSTRYEXPERIANCE
 IT-Support, University of Maryland: Responsible for managing the complete Computer
infrastructure in the department, receive requests on phone and email and resolve various
network and hardware issues on Linux, Windows and Mac.
Dec’14-
Present
 NetworkEngineer,Wipro Technologies:Trainedin configuring Cisco routers and switches,
implemented various routing protocols such as OSPF,BGP and RIP. Workin the team involved
monitoring the network using the BMC-BPPMand secure network-using NMAP
Nov’13-
April’14
 SummerIntern, DefenseResearchandDevelopmentOrganization(DRDO),NewDelhi:
Studied Various Cryptography Algorithms. Worked on RC4 and A5 stream Cipher and
implemented them in C++.
May’12 -
July’12
ACADEMIC PROJECTS
 Hill CipherinPython:Implemented Cryptographic algorithm Hill Cipher in python. Mar - 2015
 SystemVulnerabilityAnalysis:EvaluatedVulnerabilities of various websites by scanning
using NMAP and Metasploit.
Mar-April
2015
 DesignedMultilayerSecurityplan:Asa part of the course cyber-security,prepared a security
plan foran organization. Covered all seven SSCP domains and defined Access Control, Admin
Hierarchy, Multi-factorauthentication, Log Tables, Implemented packetfiltering and
application proxy by defining firewallas wellas defined URLfiltering, IDS & IPS and Honey Pot.
FollowedRisk assessment methodology as described by NIST.
April-2015
 AnalyzingTrafficUsingWireshark: Usingwireshark analyzed networktraffic between a
machine and a Google server, used different filters in the project.
Feb-2015
 UDP SocketProgramminginJava:Developeda distributed networkapplication consisting of
a transmitter and a receiver and ensured reliable data transfer by using cryptographic
algorithm.
OCT-Dec
2015
 AmazonwebServers: Worked on various Aws services, like creating Elastic IPs,Elastic Load
Balancing, Amazon Simple Storage Service (S3)
Feb-March
2016
 GSM/ LTE Deployment– SimulationinMentumPlanet:Efficiently simulated deployment of
30 GSM Base Stations in DC area using Mentum Planet by regulating different parameters such
as height, downtilt, antenna EIRP,sector angles and azimuths to provide good handoff between
base stations and maximum coverage. LTE deployment simulation was carried out using 3 LTE
Base Stations to provide optimum LTE to University of Maryland, College Park.Reduced
interference by analyzing with Poseidon AWS interference calculator.
Oct– Nov
2014

More Related Content

What's hot

Machine-to-Machine-Communication-Projects
Machine-to-Machine-Communication-ProjectsMachine-to-Machine-Communication-Projects
Machine-to-Machine-Communication-Projects
Phdtopiccom
 
Data Mining Related Project Topics
Data Mining Related Project TopicsData Mining Related Project Topics
Data Mining Related Project Topics
Phdtopiccom
 
Ns2 Projects
Ns2 ProjectsNs2 Projects
Ns2 Projects
Phdtopiccom
 
Computer Science Dissertation Projects
Computer Science Dissertation ProjectsComputer Science Dissertation Projects
Computer Science Dissertation Projects
Phdtopiccom
 
PhD-Guidance-and-Works-with-Source-Codes
PhD-Guidance-and-Works-with-Source-CodesPhD-Guidance-and-Works-with-Source-Codes
PhD-Guidance-and-Works-with-Source-Codes
Phdtopiccom
 
Network Programming with Umit project
Network Programming with Umit projectNetwork Programming with Umit project
Network Programming with Umit project
UC San Diego
 

What's hot (6)

Machine-to-Machine-Communication-Projects
Machine-to-Machine-Communication-ProjectsMachine-to-Machine-Communication-Projects
Machine-to-Machine-Communication-Projects
 
Data Mining Related Project Topics
Data Mining Related Project TopicsData Mining Related Project Topics
Data Mining Related Project Topics
 
Ns2 Projects
Ns2 ProjectsNs2 Projects
Ns2 Projects
 
Computer Science Dissertation Projects
Computer Science Dissertation ProjectsComputer Science Dissertation Projects
Computer Science Dissertation Projects
 
PhD-Guidance-and-Works-with-Source-Codes
PhD-Guidance-and-Works-with-Source-CodesPhD-Guidance-and-Works-with-Source-Codes
PhD-Guidance-and-Works-with-Source-Codes
 
Network Programming with Umit project
Network Programming with Umit projectNetwork Programming with Umit project
Network Programming with Umit project
 

Similar to Rmann

Kasturi_Puramwar
Kasturi_Puramwar Kasturi_Puramwar
Kasturi_Puramwar
Kasturi Puramwar
 
Resume
ResumeResume
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET Journal
 
TEJAS NIKAM
TEJAS NIKAMTEJAS NIKAM
TEJAS NIKAM
Tejas Nikam
 
Srayan guhathakurta resume
Srayan guhathakurta resumeSrayan guhathakurta resume
Srayan guhathakurta resume
Srayan Guhathakurta
 
RESUME _ PRATHAMESH PISE
RESUME _ PRATHAMESH PISERESUME _ PRATHAMESH PISE
RESUME _ PRATHAMESH PISE
Prathamesh Pise
 
Naveen Narasimhaiah resume
Naveen Narasimhaiah resumeNaveen Narasimhaiah resume
Naveen Narasimhaiah resume
Naveen Narasimhaiah
 
Dubey Kaushalchandra resume
Dubey Kaushalchandra resumeDubey Kaushalchandra resume
Dubey Kaushalchandra resume
Kaushalchandra Dubey
 
Mmsys slideshare-intel-nokia
Mmsys slideshare-intel-nokiaMmsys slideshare-intel-nokia
Mmsys slideshare-intel-nokia
Rufael Mekuria
 
Akshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedInAkshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedIn
Akshay Kale
 
UTHIRA MOHAN- Resume
UTHIRA MOHAN- ResumeUTHIRA MOHAN- Resume
UTHIRA MOHAN- Resume
Uthira Mohan
 
Jain_Navya_resume
Jain_Navya_resumeJain_Navya_resume
Jain_Navya_resume
Navya Jain
 
TripathiAkriti_resume
TripathiAkriti_resumeTripathiAkriti_resume
TripathiAkriti_resume
akrititripathi
 
ApoorvJoshi_Resume
ApoorvJoshi_ResumeApoorvJoshi_Resume
ApoorvJoshi_Resume
Apoorv Joshi
 
ResumeKarthikBhupalam
ResumeKarthikBhupalamResumeKarthikBhupalam
ResumeKarthikBhupalam
karthik bhupalam
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
Appaji K
 
HARIS NCSU_Resume
HARIS NCSU_ResumeHARIS NCSU_Resume
HARIS NCSU_Resume
Haris M. Ansari
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
AJASTJournal
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
Editor IJCATR
 

Similar to Rmann (20)

Kasturi_Puramwar
Kasturi_Puramwar Kasturi_Puramwar
Kasturi_Puramwar
 
Resume
ResumeResume
Resume
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
TEJAS NIKAM
TEJAS NIKAMTEJAS NIKAM
TEJAS NIKAM
 
Srayan guhathakurta resume
Srayan guhathakurta resumeSrayan guhathakurta resume
Srayan guhathakurta resume
 
RESUME _ PRATHAMESH PISE
RESUME _ PRATHAMESH PISERESUME _ PRATHAMESH PISE
RESUME _ PRATHAMESH PISE
 
Naveen Narasimhaiah resume
Naveen Narasimhaiah resumeNaveen Narasimhaiah resume
Naveen Narasimhaiah resume
 
Dubey Kaushalchandra resume
Dubey Kaushalchandra resumeDubey Kaushalchandra resume
Dubey Kaushalchandra resume
 
Mmsys slideshare-intel-nokia
Mmsys slideshare-intel-nokiaMmsys slideshare-intel-nokia
Mmsys slideshare-intel-nokia
 
Akshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedInAkshay Sanjay Kale Resume LinkedIn
Akshay Sanjay Kale Resume LinkedIn
 
UTHIRA MOHAN- Resume
UTHIRA MOHAN- ResumeUTHIRA MOHAN- Resume
UTHIRA MOHAN- Resume
 
Jain_Navya_resume
Jain_Navya_resumeJain_Navya_resume
Jain_Navya_resume
 
TripathiAkriti_resume
TripathiAkriti_resumeTripathiAkriti_resume
TripathiAkriti_resume
 
ApoorvJoshi_Resume
ApoorvJoshi_ResumeApoorvJoshi_Resume
ApoorvJoshi_Resume
 
ResumeKarthikBhupalam
ResumeKarthikBhupalamResumeKarthikBhupalam
ResumeKarthikBhupalam
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
Resume_Appaji
Resume_AppajiResume_Appaji
Resume_Appaji
 
HARIS NCSU_Resume
HARIS NCSU_ResumeHARIS NCSU_Resume
HARIS NCSU_Resume
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 

Rmann

  • 1. Rohit Mann rohit09@umd.edu, Pho ne:(301)-302-5298, Address: 3407, Tulane Drive, Apt.# 11, Hyattsville, Maryland 20783 EDUCATION  M.S inTelecommunications University of Maryland May - 2016 GPA:3.45/4  B.Tech,ElectronicsandCommunication Amity University,Noida, India April - 2013 CGPA:6.5/10 COURSEWORK 1) Networks and protocols 2)Cyber security 3) Cryptography 4) Cloud Computing 5) AWS-PCS System Implementation. TECHNICALSKILLS  NetworkProtocols:TCP/IP,UDP,DHCP,DNS,NAT, RIP,OSPF, BGP,EIRP,and HTTPS.  SecurityTechnologies:Public-Privatekey encryption,SSL, AES, DES, RSA Algorithms.  WirelessTechnologies:UMTS, LTE, 802.11(a, b, g, n, ac).  Tools:WireShark, BMC-BPPM Network Management Tool, BMC- Remedy Ticketing Tool, Mentum Planet, Eclipse, GNS3  Programming skills: Python, Java.  Operating Systems: Windows,Linux, Mac OS INDUSTRYEXPERIANCE  IT-Support, University of Maryland: Responsible for managing the complete Computer infrastructure in the department, receive requests on phone and email and resolve various network and hardware issues on Linux, Windows and Mac. Dec’14- Present  NetworkEngineer,Wipro Technologies:Trainedin configuring Cisco routers and switches, implemented various routing protocols such as OSPF,BGP and RIP. Workin the team involved monitoring the network using the BMC-BPPMand secure network-using NMAP Nov’13- April’14  SummerIntern, DefenseResearchandDevelopmentOrganization(DRDO),NewDelhi: Studied Various Cryptography Algorithms. Worked on RC4 and A5 stream Cipher and implemented them in C++. May’12 - July’12 ACADEMIC PROJECTS  Hill CipherinPython:Implemented Cryptographic algorithm Hill Cipher in python. Mar - 2015  SystemVulnerabilityAnalysis:EvaluatedVulnerabilities of various websites by scanning using NMAP and Metasploit. Mar-April 2015  DesignedMultilayerSecurityplan:Asa part of the course cyber-security,prepared a security plan foran organization. Covered all seven SSCP domains and defined Access Control, Admin Hierarchy, Multi-factorauthentication, Log Tables, Implemented packetfiltering and application proxy by defining firewallas wellas defined URLfiltering, IDS & IPS and Honey Pot. FollowedRisk assessment methodology as described by NIST. April-2015  AnalyzingTrafficUsingWireshark: Usingwireshark analyzed networktraffic between a machine and a Google server, used different filters in the project. Feb-2015  UDP SocketProgramminginJava:Developeda distributed networkapplication consisting of a transmitter and a receiver and ensured reliable data transfer by using cryptographic algorithm. OCT-Dec 2015  AmazonwebServers: Worked on various Aws services, like creating Elastic IPs,Elastic Load Balancing, Amazon Simple Storage Service (S3) Feb-March 2016  GSM/ LTE Deployment– SimulationinMentumPlanet:Efficiently simulated deployment of 30 GSM Base Stations in DC area using Mentum Planet by regulating different parameters such as height, downtilt, antenna EIRP,sector angles and azimuths to provide good handoff between base stations and maximum coverage. LTE deployment simulation was carried out using 3 LTE Base Stations to provide optimum LTE to University of Maryland, College Park.Reduced interference by analyzing with Poseidon AWS interference calculator. Oct– Nov 2014