The document provides a summary of a senior associate's professional experience in e-commerce, including 4 years of experience in internet and e-commerce roles. The summary highlights experience in competitor monitoring and analysis, pricing analysis, project management, and mentoring junior associates for companies such as Amazon and Goldman Sachs in India. Technical skills include Microsoft Office, analytics tools, and experience managing databases.
We kindly Request you to give us an opportunity to serve you and we assure you of our sincere effort to meet out your expectations with utmost care and responsibility.
We kindly Request you to give us an opportunity to serve you and we assure you of our sincere effort to meet out your expectations with utmost care and responsibility.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Saranya_CV_Senior_Associate
1. Flat no:4, 158 B,
Marlowes, Hemel Hempstead
HP1 1BA, UNITED KINGDOM
T +44 (0)1442 769 647
M +44 (0)7494 015 465
Qualified Senior Associate with 4 years Internet and E-Commerce related experience. Highly professional,
well organized and committed team member that can be trusted to take on and deliver any task to a high
level of quality while maintaining accuracy. Extremely flexible and adaptable in all working environments.
Pragmatic in approach to work and demonstrates excellent soft skills when working in a very difficult climate,
not only environmentally but culturally as well.
Key Skills:
▪ Competitor Analysis ▪ Internet
▪ Competitor Monitoring ▪ Customer Service
▪ Process Automation ▪ E-Commerce
▪ Pricing Analysis ▪ Working with Off-shore Teams
▪ Investment Banking ▪ Excellent communicator at all levels
▪ Excellent Customer Facing Skills ▪ Working collaboratively across teams
▪ Mentoring/Managing Junior Associates ▪ Project Management
Software and Tools:
▪ Microsoft Visio ▪ Microsoft Word
▪ Microsoft Excel Workbook ▪ Forward Audits Tool
▪ Microsoft Outlook ▪ Amazon E-Book Mapping Tools
▪ Microsoft PowerPoint ▪ Pricing Tools
▪ SharePoint ▪ Trouble Ticketing Tool
Amazon.com, Inc. Chennai India OCTOBER 2014 – JANUARY 2016
Off-Shore: Amazon.com, London UK and US region
As a senior associate in the e-book auditing team, I was the point of contact for Amazon’s vendor manager’s
across the globe for e-book related auditing.
This role involved validating the availability of best-selling e-book’s in Amazon website as against the
availability of the same in the competitor’s website. As part of this role I was also involved in mentoring and
managing a number of junior associates in my team.
Position: Senior Digital Process Associate
Saranya Seetharaman
PERSONAL PROFILE
TECHNICAL EXPERIENCE
EMPLOYMENT DETAILS
2. Projects : E-Book Process Automation, E-Book DPH (Detail Page Hit) Analysis
Technologies : Microsoft Visio
Microsoft Office
MySQL Database
Key Responsibilities:
Creation of NOS (No Selection) reports for Canada, Mexico and United Kingdom regions to have a
concerted view on the titles not available on Amazon website.
Ownership and optimized management of Selection tracking audits process since 2014, lead to the
acquisition of Final Bestseller reporting process from the Europe Vendor Management Team from August
2015.
Responsibility of generating the Nielsen TOP250(IN Tracking Report) on a weekly basis and sharing it with
the business stakeholders.
Supported few selection tracking tasks in the absence of the Vendor Managers for the EU regions.
Constantly monitoring the new competitors available across online marketplaces and understanding the
competitor behavior through Selection Tracking which are still not part of the mapping feed.
Owned the IN 5K Report from Nielsen that is sent out on a monthly basis to the vendor management
team which is maintained to have a Publisher wise Title Selection Tracking, of the List which is helpful for
the VMs to contact the publishers respectively. Also, the report helps to study the %availability of the
titles across a number of Months/Quarters.
Constantly monitoring the availability of Author Specific Titles on other competitors and reporting the
same to Business, which are exclusively owned by Amazon (For example: Chetan Bhagat Titles on other
competitors for the IN Region)
Amazon.com, Inc. Chennai India OCTOBER 2012 – OCTOBER 2014
As a digital associate in the e-book selection and pricing team, I was responsible for competitor monitoring in
terms of pricing and selection. I also had an opportunity to be part of various ad-hoc processes that drove me
to enhance my knowledge and process management skills which in turn helped me to drive new reports and
handle business requests effectively.
Achieving my targets on time and continuously optimising the time spent on manual processes, lead to my
promotion as a Senior Associate in the year 2014.
Position: Digital Process Associate
Projects: Spark Override Audits, Mapping Feed Restriction (Process Optimisation), Spark UI (User
Interface) Enhancement
Technologies: MS Excel
MS Visio
MS Word
MS PowerPoint
Spark UI
3. Key Responsibilities:
Created the SPARK OVERRIDE process to manage the overrides performed by multiple teams in their
daily tasks within Amazon and ensure there are no loopholes which affects the pricing.
Initiated a process to identify incorrectly removed mappings by the KDP associates, in various geographic
locations and ensured a local proxy is being used to maintain the accuracy in competitiveness.
Identified the disparity in SOP’s (Standard Operating procedure) followed across team and implemented a
standardised change to significantly minimise the incorrect overrides.
Analysed the pricing disparities within Random Audits on a fortnightly basis which helped in minimizing
the efforts of the mapping and the automation team.
Organised a number of meetings with the manual mapping and the automation team to acquire the first
level root causing from their end which in turn minimized their efforts as well as ours in providing the
same for the status change and the disparity failures.
Goldman Sachs, Bengaluru Area, India MAY 2012 – OCTOBER 2012
The Goldman Sachs Group, Inc. is a leading global investment banking, securities and investment
management firm that provides a wide range of financial services to a substantial and diversified client base
that includes corporations, financial institutions, governments and individuals.
As an Operations Analyst, I was part of the Asset Servicing team that deals with providing investment advisory
and financial planning services.
Position: Operations Analyst
Projects: Asset Management, Investment Dashboards
Technologies: Quality Centre Test Management (Test Planning, Test Execution & Defect Tracking)
Jira and Bugzilla (3rd
party vendor Defect Management Tools)
Key Responsibilities:
Worked on dashboards, contacting the intermediaries based on the Stakeholder requirements with
respect to the assets/Investments and handling tickets.
The timely orientations conducted across the firm taught me the facet of networking with people from
different teams irrespective of their experience and background.
Part of daily huddles and team meetings to effectively deliver the tasks and provide a regular update to
the team leader.
4. Indian Overseas Bank, Chennai, India OCTOBER 2011 – MARCH 2012
Indian Overseas Bank (IOB) is a major public sector bank based in Chennai (Madras), with about 3700
domestic branches, including 1150 branches in Tamil Nadu/India.
As a Junior Accountant Intern, I was part of the Loan Management team responsible for constant update on
the loan holders and making sure the interest amount is paid without any delay.
Position: Junior Accountant (Intern)
Project: Savings Bank Account
Loans & Advances
Key Responsibilities:
Part of the Loan Management team responsible for constant update on the loan holders and making
sure the interest amount is paid without any delay.
Managing the overall spreadsheet of the vehicle loans and acting as an intermediary between the
vehicle dealer (Bajaj) and the bank.
Familiarization and hands on experience in various departments namely current account, savings
account, loans and advances and deposits
Producing test cases based on identified business processes.
Bachelors in Commerce (First Class) June 2009 – May 2012
Ethiraj College for Women, (Affiliated to the University of Madras) Chennai, India
Higher Secondary Examination (Distinction) April 2008– March 2009
PSBB Secondary School, Chennai, India
* References : Available Upon Request
EDUCATIONAL QUALIFICATIONS