Experienced, professional and dedicated to providing high quality services as well as positive results. Well versed in workflow analysis and SIEM with proven ability to leverage technology and achieve organizational objectives.
Shahed Janjua is seeking a position that allows growth and learning. He has 19 months of experience in IT infrastructure management, compliance, and risk management at IBM India. His skills include Linux, Windows, databases, programming languages, and IBM security tools. He is a top performer, mentor, and idea contributor who aims to improve processes. Janjua has a Bachelor's degree in Computer Science and Engineering and is based in Bangalore.
Susil Kumar Subash is seeking a mid-senior level role utilizing over 6.5 years of experience in IT operations, service delivery, project implementation, and infrastructure support. He has a history of managing teams and is proficient in various technologies including Citrix, virtual infrastructure, networking, Windows OS, and ITIL processes. Susil holds an MCA degree and several professional certifications focused on IT service management.
Fehmida Sayed - IT Head, Senior Manager-Infra and InfosecFehmida Sayed
The candidate has over 20 years of experience in IT management roles. He has extensive experience leading IT infrastructure projects including network upgrades, security compliance, and SAP implementation. Some of his key responsibilities have included information security management, project portfolio management, email infrastructure management, and service desk operations. He possesses technical skills in areas such as ISO 27001, ITIL, Exchange, and Domino administration.
Joe D. Miller is an experienced IT support technician with over 25 years of experience in desktop support, network administration, and field service engineering roles. He possesses strong technical skills and the ability to diagnose hardware and software problems to resolve issues. Miller is skilled in customer service, team leadership, and presenting complex solutions clearly. He is currently seeking a new opportunity to make use of his experience in areas such as network support, IT service management, and end user support.
Pancha Brahma is a career-driven IT professional with over 7 years of experience in IT network engineering, application support, IT process management, and client relationship management. He has technical skills in Microsoft server operating systems, networking concepts, and ticketing tools. He currently works as a Process Lead at IBM India Private Limited where he is responsible for technical support, operations, training, and quality assurance management. Previously he has worked as an IT help desk engineer and technical analyst providing support on a variety of hardware, software, and networking issues.
Rapinder Kaur is an ambitious data analyst with over 10 years of experience working for major companies like Jaguar Land Rover, British Telecom, and Bank of America. She has strong skills in data collection, analysis, reporting, and ensuring data quality and security. Currently she works as a data analyst for Jaguar Land Rover, supporting their quality department and creating reports. She has a Master's degree in Computer Application and various other computer-related qualifications.
This lecture include detail about engineering especially software engineering profession. include common and mostly used schema to develop organisational structure.
The document discusses systems development and analysis. It provides information on:
1) Why planning is important for systems development projects given failure rates.
2) The roles involved in systems development including stakeholders, users, systems analysts, and programmers.
3) What a systems analyst does which includes evaluating processes, documenting systems, and specifying requirements for programmers.
4) The typical systems development life cycle of investigation, analysis, design, implementation, and maintenance.
Shahed Janjua is seeking a position that allows growth and learning. He has 19 months of experience in IT infrastructure management, compliance, and risk management at IBM India. His skills include Linux, Windows, databases, programming languages, and IBM security tools. He is a top performer, mentor, and idea contributor who aims to improve processes. Janjua has a Bachelor's degree in Computer Science and Engineering and is based in Bangalore.
Susil Kumar Subash is seeking a mid-senior level role utilizing over 6.5 years of experience in IT operations, service delivery, project implementation, and infrastructure support. He has a history of managing teams and is proficient in various technologies including Citrix, virtual infrastructure, networking, Windows OS, and ITIL processes. Susil holds an MCA degree and several professional certifications focused on IT service management.
Fehmida Sayed - IT Head, Senior Manager-Infra and InfosecFehmida Sayed
The candidate has over 20 years of experience in IT management roles. He has extensive experience leading IT infrastructure projects including network upgrades, security compliance, and SAP implementation. Some of his key responsibilities have included information security management, project portfolio management, email infrastructure management, and service desk operations. He possesses technical skills in areas such as ISO 27001, ITIL, Exchange, and Domino administration.
Joe D. Miller is an experienced IT support technician with over 25 years of experience in desktop support, network administration, and field service engineering roles. He possesses strong technical skills and the ability to diagnose hardware and software problems to resolve issues. Miller is skilled in customer service, team leadership, and presenting complex solutions clearly. He is currently seeking a new opportunity to make use of his experience in areas such as network support, IT service management, and end user support.
Pancha Brahma is a career-driven IT professional with over 7 years of experience in IT network engineering, application support, IT process management, and client relationship management. He has technical skills in Microsoft server operating systems, networking concepts, and ticketing tools. He currently works as a Process Lead at IBM India Private Limited where he is responsible for technical support, operations, training, and quality assurance management. Previously he has worked as an IT help desk engineer and technical analyst providing support on a variety of hardware, software, and networking issues.
Rapinder Kaur is an ambitious data analyst with over 10 years of experience working for major companies like Jaguar Land Rover, British Telecom, and Bank of America. She has strong skills in data collection, analysis, reporting, and ensuring data quality and security. Currently she works as a data analyst for Jaguar Land Rover, supporting their quality department and creating reports. She has a Master's degree in Computer Application and various other computer-related qualifications.
This lecture include detail about engineering especially software engineering profession. include common and mostly used schema to develop organisational structure.
The document discusses systems development and analysis. It provides information on:
1) Why planning is important for systems development projects given failure rates.
2) The roles involved in systems development including stakeholders, users, systems analysts, and programmers.
3) What a systems analyst does which includes evaluating processes, documenting systems, and specifying requirements for programmers.
4) The typical systems development life cycle of investigation, analysis, design, implementation, and maintenance.
The document discusses the roles of various analysts involved in systems analysis and design. It describes the roles of business analysts, system analysts, infrastructure analysts, change management analysts, and project managers. It explains that business analysts focus on business issues and value, system analysts focus on improving business processes through information systems, and infrastructure analysts focus on system interfaces and standards. Change management analysts coordinate user training and adoption while project managers are responsible for schedules, budgets, and benefits delivery.
Computer systems analysts help organizations operate more efficiently by analyzing computer systems and interactions, and making recommendations for improvement. They choose and configure hardware and software, match technology to user needs, monitor systems, troubleshoot problems, and frequently consult with management, users, and other IT professionals. A bachelor's degree in computer systems or related field is typically required, along with skills in networking, communications, software, and analytical problem solving. Employment in this field is expected to grow faster than average, with a median salary of $78,770 in 2011.
This document discusses various roles in the IT industry and the skills required for each role. It describes roles such as programmer, web designer, web administrator, technical writer, content developer, instructional designer, software tester, database administrator, system administrator, network administrator, documentation, language reviewer, technical support, customer support, hardware engineer, and MIS. For each role, it outlines the key responsibilities and skills needed. It emphasizes the importance of both technical skills and soft skills for candidates in the IT industry.
This document discusses various roles in the IT industry and the skills required for each role. It describes roles such as programmer, web designer, web administrator, technical writer, content developer, instructional designer, software tester, database administrator, system administrator, network administrator, documentation, language reviewer, technical support, customer support, hardware engineer, and MIS. For each role, it outlines the key responsibilities and skills needed. It emphasizes the importance of both technical skills and soft skills for candidates in the IT industry.
The document discusses principles and concepts of international project portfolio management (IPPM), including PM principles, elements, methodologies, and leadership qualities. It also addresses managing projects through initiation, planning, implementation, closure, and follow up. Key considerations for project definition include objectives, scope, business case, risks, staffing, and alignment with organizational strategy.
The document discusses various topics related to systems analysis and design including:
- The phases of analysis and design which include requirement analysis, system design, implementation, testing, evaluation, and maintenance.
- The role of the systems analyst in consulting with businesses, supporting experts within organizations, and acting as change agents and problem solvers.
- The different types of information systems such as transaction processing systems, decision support systems, and expert systems.
- The use of tools like CASE and UML to aid in analysis and design.
Ajit Kumar Padhy is applying for the position of Team Lead/Technical Lead and has over 8 years of experience in managing IT service desks and infrastructure support. He currently works as a Technical Team Leader providing desktop support and managing a team of 15 engineers. Padhy has expertise in areas like system administration, technical troubleshooting, SLA management, and customer relationship management.
Quality and Information Security AssuranceKumud Mishra
Quality Management, Information Security Management, Process Management, Process Excellence, Delivery Excellence, Risk Assurance, Project Management, ISO 9001, CMMI, ISO 20000, Six Sigma, ISO 27001, PCI-DSS
Computer systems analysts study an organization's current systems and procedures to design new information systems solutions that help the organization operate more efficiently. They consult with managers to determine IT's role, research new technologies, analyze costs and benefits of upgrades, design and develop new systems, and ensure systems work properly. Demand is growing 25% by 2024 as computers take on more business functions. Salaries range from $53,000 for desktop support to over $100,000 for senior roles and consultants. A bachelor's degree in fields like computer information systems or management information systems is typical for entry-level positions.
Computer Applications and Systems - Workshop IVRaji Gogulapati
This document summarizes the topics covered in Workshop IV of the course BIS 220: Introduction to Computer Systems and Applications. The topics discussed include reasons for systems implementation failures, systems failures at different stages, types of failures, systems planning and selection, systems development methodologies and options, and IT funding and costs. It also provides an overview of the basic systems development life cycle, tools used at different stages, and project management elements. The document concludes with next steps which are to prepare assignments, read recommended materials, and prepare for the final exam in weeks 4-5.
The systems analyst uses analysis and design techniques to solve business problems using information technology. They understand the business needs and technical requirements, evaluate solutions, and implement the chosen solution. A systems analyst requires knowledge of computers, networks, databases, programming languages, and operating systems as well as business processes, organizational structure, and how people work and communicate. They use tools like databases, IDEs, and CASE tools to develop system specifications and employ techniques such as project planning, requirements modeling, and database design.
This resume is for Tayyab Raza Sayyed. He has over 10 years of experience in customer service and IT asset management roles. Currently, he works as an IT Asset Management Analyst at NCR Corporation, where he is responsible for the lifecycle management of IT assets across several regions. Previously, he has worked in technical support, server monitoring, and recruitment. He has a secondary education qualification and additional skills in Microsoft Office, ITIL frameworks, and asset management tools.
Shailendra Singh Dobliyal has over 7 years of experience in software quality assurance and network management. He has expertise in testing web-based applications and manual testing. Currently working as a Software Quality Engineer at MPS Limited, his responsibilities include test case preparation, execution, and defect tracking. Dobliyal has skills in black box testing, regression testing, bug tracking, and programming languages like Java, C, and C++. He holds an MCA degree from UIM, UTU and seeks to continuously learn new technologies.
This document provides an overview and agenda for a lecture on decision support systems (DSS). It begins by discussing decision making and problem solving, and how DSS can assist with these processes. It then defines DSS and compares them to management information systems. The core components of a DSS are explained as the database, model base, and dialogue manager. Examples of model-driven and data-driven DSS are provided. The document concludes by recommending additional resources on DSS.
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...Johnny Dennis
Johnny Dennis seeks a leadership position in information security. He has over 15 years of experience in information security, including roles managing identity and access management teams at Allina Health and Blue Cross Blue Shield. His skills include UML, SQL, Powershell, and information security concepts such as confidentiality, integrity, authentication, and defense in depth. He holds graduate certificates in information assurance and database administration and a bachelor's degree in management information systems.
Rajorshi Bose is seeking a role as a Technical Lead or Business Analyst. He has over 6 years of experience in business analysis and software development using Teradata and Netezza. Currently working as a Teradata Application Analyst at IBM Pune, he has led teams of up to 6 members on projects for clients like Vodafone, Maersk, and Apple. He is proficient in requirements gathering, design, development, testing and has expertise in data warehousing, business intelligence and analytics.
Arpit Srivastava has over 10 years of experience in IT with expertise in development, maintenance, implementation, project management, and more. He has extensive experience working with retail, investment management, and healthcare clients on projects involving supply chain management, ERP systems, and document management systems. Srivastava is proficient in various programming languages, tools, and methodologies and has managed teams of up to 7 people.
The document discusses cyber security and information systems. It covers topics like the types of information systems, components of an information system, development of information systems, introduction to information security and the CIA triad, and the need for information security. The presenter, Mrs. Nidhi Rastogi, discusses these topics in detail over several slides.
Rajiv Shrikant Bhalerao is a technology professional with over 3 years of experience working in identity and access management. He is currently a System Administrator at Synchrony Financial, where he manages user accounts in Active Directory and other systems. Previously, he worked at CSC Pvt Ltd as a System Administrator, where he was responsible for user provisioning and access rights management. He has experience administering Active Directory, user accounts, groups and computers. Rajiv aims to adapt to the changing corporate world and learn new technical concepts to utilize productively. He has a Bachelor's degree in Information Technology.
This document provides a career conspectus for an IT professional with 7 years of experience in information security, user access management, and IT helpdesk. The professional's areas of expertise include IT security, user access management, auditing, and training. They have worked as a systems analyst, consultant, and customer support officer. Their education includes a Bachelor's degree in Business Administration and they have numerous training certificates. They are seeking a new career opportunity in the IT industry to further develop their skills and knowledge through learning and dedicated work.
Vivek Sharma has over 9 years of experience in IT service management roles, including currently working as an ITSM Process Consultant at HCL Technologies where he manages a team of 12 members supporting global service management environments. He has ITIL and CCNA certifications and has experience leading incident, problem, and change management processes for clients like Deutsche Bank and IBM. The document provides details of his work history, roles, responsibilities, and qualifications.
Parthasarathy is a SAP MM/SD functional consultant with over 10 years of experience implementing and supporting SAP systems. He currently works for Hewlett Packard, where he resolves production issues and handles escalations. Parthasarathy has expertise in materials management, master data configuration, procurement processes, and system integration. He is skilled in ABAP, VBA, Windows operating systems, and Microsoft Office applications.
The document discusses the roles of various analysts involved in systems analysis and design. It describes the roles of business analysts, system analysts, infrastructure analysts, change management analysts, and project managers. It explains that business analysts focus on business issues and value, system analysts focus on improving business processes through information systems, and infrastructure analysts focus on system interfaces and standards. Change management analysts coordinate user training and adoption while project managers are responsible for schedules, budgets, and benefits delivery.
Computer systems analysts help organizations operate more efficiently by analyzing computer systems and interactions, and making recommendations for improvement. They choose and configure hardware and software, match technology to user needs, monitor systems, troubleshoot problems, and frequently consult with management, users, and other IT professionals. A bachelor's degree in computer systems or related field is typically required, along with skills in networking, communications, software, and analytical problem solving. Employment in this field is expected to grow faster than average, with a median salary of $78,770 in 2011.
This document discusses various roles in the IT industry and the skills required for each role. It describes roles such as programmer, web designer, web administrator, technical writer, content developer, instructional designer, software tester, database administrator, system administrator, network administrator, documentation, language reviewer, technical support, customer support, hardware engineer, and MIS. For each role, it outlines the key responsibilities and skills needed. It emphasizes the importance of both technical skills and soft skills for candidates in the IT industry.
This document discusses various roles in the IT industry and the skills required for each role. It describes roles such as programmer, web designer, web administrator, technical writer, content developer, instructional designer, software tester, database administrator, system administrator, network administrator, documentation, language reviewer, technical support, customer support, hardware engineer, and MIS. For each role, it outlines the key responsibilities and skills needed. It emphasizes the importance of both technical skills and soft skills for candidates in the IT industry.
The document discusses principles and concepts of international project portfolio management (IPPM), including PM principles, elements, methodologies, and leadership qualities. It also addresses managing projects through initiation, planning, implementation, closure, and follow up. Key considerations for project definition include objectives, scope, business case, risks, staffing, and alignment with organizational strategy.
The document discusses various topics related to systems analysis and design including:
- The phases of analysis and design which include requirement analysis, system design, implementation, testing, evaluation, and maintenance.
- The role of the systems analyst in consulting with businesses, supporting experts within organizations, and acting as change agents and problem solvers.
- The different types of information systems such as transaction processing systems, decision support systems, and expert systems.
- The use of tools like CASE and UML to aid in analysis and design.
Ajit Kumar Padhy is applying for the position of Team Lead/Technical Lead and has over 8 years of experience in managing IT service desks and infrastructure support. He currently works as a Technical Team Leader providing desktop support and managing a team of 15 engineers. Padhy has expertise in areas like system administration, technical troubleshooting, SLA management, and customer relationship management.
Quality and Information Security AssuranceKumud Mishra
Quality Management, Information Security Management, Process Management, Process Excellence, Delivery Excellence, Risk Assurance, Project Management, ISO 9001, CMMI, ISO 20000, Six Sigma, ISO 27001, PCI-DSS
Computer systems analysts study an organization's current systems and procedures to design new information systems solutions that help the organization operate more efficiently. They consult with managers to determine IT's role, research new technologies, analyze costs and benefits of upgrades, design and develop new systems, and ensure systems work properly. Demand is growing 25% by 2024 as computers take on more business functions. Salaries range from $53,000 for desktop support to over $100,000 for senior roles and consultants. A bachelor's degree in fields like computer information systems or management information systems is typical for entry-level positions.
Computer Applications and Systems - Workshop IVRaji Gogulapati
This document summarizes the topics covered in Workshop IV of the course BIS 220: Introduction to Computer Systems and Applications. The topics discussed include reasons for systems implementation failures, systems failures at different stages, types of failures, systems planning and selection, systems development methodologies and options, and IT funding and costs. It also provides an overview of the basic systems development life cycle, tools used at different stages, and project management elements. The document concludes with next steps which are to prepare assignments, read recommended materials, and prepare for the final exam in weeks 4-5.
The systems analyst uses analysis and design techniques to solve business problems using information technology. They understand the business needs and technical requirements, evaluate solutions, and implement the chosen solution. A systems analyst requires knowledge of computers, networks, databases, programming languages, and operating systems as well as business processes, organizational structure, and how people work and communicate. They use tools like databases, IDEs, and CASE tools to develop system specifications and employ techniques such as project planning, requirements modeling, and database design.
This resume is for Tayyab Raza Sayyed. He has over 10 years of experience in customer service and IT asset management roles. Currently, he works as an IT Asset Management Analyst at NCR Corporation, where he is responsible for the lifecycle management of IT assets across several regions. Previously, he has worked in technical support, server monitoring, and recruitment. He has a secondary education qualification and additional skills in Microsoft Office, ITIL frameworks, and asset management tools.
Shailendra Singh Dobliyal has over 7 years of experience in software quality assurance and network management. He has expertise in testing web-based applications and manual testing. Currently working as a Software Quality Engineer at MPS Limited, his responsibilities include test case preparation, execution, and defect tracking. Dobliyal has skills in black box testing, regression testing, bug tracking, and programming languages like Java, C, and C++. He holds an MCA degree from UIM, UTU and seeks to continuously learn new technologies.
This document provides an overview and agenda for a lecture on decision support systems (DSS). It begins by discussing decision making and problem solving, and how DSS can assist with these processes. It then defines DSS and compares them to management information systems. The core components of a DSS are explained as the database, model base, and dialogue manager. Examples of model-driven and data-driven DSS are provided. The document concludes by recommending additional resources on DSS.
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...Johnny Dennis
Johnny Dennis seeks a leadership position in information security. He has over 15 years of experience in information security, including roles managing identity and access management teams at Allina Health and Blue Cross Blue Shield. His skills include UML, SQL, Powershell, and information security concepts such as confidentiality, integrity, authentication, and defense in depth. He holds graduate certificates in information assurance and database administration and a bachelor's degree in management information systems.
Rajorshi Bose is seeking a role as a Technical Lead or Business Analyst. He has over 6 years of experience in business analysis and software development using Teradata and Netezza. Currently working as a Teradata Application Analyst at IBM Pune, he has led teams of up to 6 members on projects for clients like Vodafone, Maersk, and Apple. He is proficient in requirements gathering, design, development, testing and has expertise in data warehousing, business intelligence and analytics.
Arpit Srivastava has over 10 years of experience in IT with expertise in development, maintenance, implementation, project management, and more. He has extensive experience working with retail, investment management, and healthcare clients on projects involving supply chain management, ERP systems, and document management systems. Srivastava is proficient in various programming languages, tools, and methodologies and has managed teams of up to 7 people.
The document discusses cyber security and information systems. It covers topics like the types of information systems, components of an information system, development of information systems, introduction to information security and the CIA triad, and the need for information security. The presenter, Mrs. Nidhi Rastogi, discusses these topics in detail over several slides.
Rajiv Shrikant Bhalerao is a technology professional with over 3 years of experience working in identity and access management. He is currently a System Administrator at Synchrony Financial, where he manages user accounts in Active Directory and other systems. Previously, he worked at CSC Pvt Ltd as a System Administrator, where he was responsible for user provisioning and access rights management. He has experience administering Active Directory, user accounts, groups and computers. Rajiv aims to adapt to the changing corporate world and learn new technical concepts to utilize productively. He has a Bachelor's degree in Information Technology.
This document provides a career conspectus for an IT professional with 7 years of experience in information security, user access management, and IT helpdesk. The professional's areas of expertise include IT security, user access management, auditing, and training. They have worked as a systems analyst, consultant, and customer support officer. Their education includes a Bachelor's degree in Business Administration and they have numerous training certificates. They are seeking a new career opportunity in the IT industry to further develop their skills and knowledge through learning and dedicated work.
Vivek Sharma has over 9 years of experience in IT service management roles, including currently working as an ITSM Process Consultant at HCL Technologies where he manages a team of 12 members supporting global service management environments. He has ITIL and CCNA certifications and has experience leading incident, problem, and change management processes for clients like Deutsche Bank and IBM. The document provides details of his work history, roles, responsibilities, and qualifications.
Parthasarathy is a SAP MM/SD functional consultant with over 10 years of experience implementing and supporting SAP systems. He currently works for Hewlett Packard, where he resolves production issues and handles escalations. Parthasarathy has expertise in materials management, master data configuration, procurement processes, and system integration. He is skilled in ABAP, VBA, Windows operating systems, and Microsoft Office applications.
How to classify documents automatically using NLPSkyl.ai
This document provides an overview of how to classify documents automatically using natural language processing (NLP). It begins with introducing NLP text classification and the types of classification that can be performed at the document, paragraph, sentence, and sub-sentence levels. It then discusses several business applications of content classification including legal document discovery, enabling customer support, and online content classification. The document demonstrates a live classification of news articles into categories. It also discusses challenges of implementing AI/ML projects and best practices for data collection, quality, security, labeling, infrastructure, skills, speed and continuous improvement. It promotes the capabilities of Skyl.ai as an ML automation platform to help overcome these challenges.
Nimish Agrawal has over 2 years of experience working as a product developer. He has worked on projects for Cognizant Technology Solutions and Computer Sciences Corporation involving supply chain management, retail, and insurance domains. Currently, he works on the Point IN insurance project, performing activities like analyzing issues, developing resolutions, and testing solutions. He is proficient in languages like SQL, RPG/400, and COBOL and has expertise in AS400 applications.
Rajiv Shrikant Bhalerao is a technology professional with over 3 years of experience in identity and access management. He currently works as a system administrator for Synchrony Financial, where he manages user accounts in Active Directory, mainframes, and UNIX environments. Some of his responsibilities include creating and deleting user accounts, applying security permissions, and troubleshooting operating systems. Previously he worked for CSC Pvt Ltd as a system administrator, where he administered Active Directory and was responsible for identity and access management tasks. He has experience working in teams and leading the migration of over 2000 user accounts from a GE VPN to a SYNC VPN environment.
Rajiv Shrikant Bhalerao is a technology professional with over 3 years of experience in identity and access management. He currently works as a system administrator for Synchrony Financial, where he manages user accounts in Active Directory, applies security permissions, and conducts identity audits. Previously, he worked for CSC Pvt Ltd as a system administrator, where he administered user accounts and permissions in Active Directory, mainframes, and UNIX environments. He has strong communication, troubleshooting, and problem solving skills. Rajiv has a Bachelor of Technology degree in Information Technology.
Rajiv Shrikant Bhalerao is a technology professional with over 3 years of experience in identity and access management. He currently works as a system administrator for Synchrony Financial, where he manages user accounts in Active Directory, mainframes, and UNIX environments. Some of his responsibilities include creating and deleting user accounts, applying security permissions, and troubleshooting operating systems. Previously he worked for CSC Pvt Ltd as a system administrator, where he administered Active Directory and was responsible for identity and access management tasks. He has experience working in teams and leading the migration of over 2000 user accounts from a GE VPN to a SYNC VPN environment.
Samyuktha Javangula is seeking a challenging position as a software tester where she can apply her 4+ years of experience testing web, standalone, and mobile applications. She has expertise in manual testing, test planning, test case development, defect reporting, and working in Agile methodologies. She is proficient in testing functionality, security, and performance on both Android and iOS mobile platforms.
Dhananjay rao Neeli provides a curriculum vitae summarizing his experience in software testing including 4 years experience in ETL testing, functional testing, and regression testing. He has skills in databases, bug tracking tools, and testing methodologies. He has a Bachelor's degree in Computer Science and lists technical skills in operating systems, databases, and testing types. Three projects are summarized describing his roles and responsibilities as a test engineer focusing on test case development, execution, and reporting for various clients and domains including retail, e-commerce, and email marketing.
Kristoffer Chavez is a 34-year-old Filipino project manager currently working at Citibank Philippines. He has over 15 years of experience in information technology roles including helpdesk support, systems administration, and project management. His current role involves managing projects related to GIDA (Global Information Data Architecture) services and providing consultative support on information security and risk assessments. Previously he held several project management and support roles at Citibank in the Philippines, Singapore, and globally. He has a college degree in computer engineering from AMA Computer University and holds MCP and MCDST certifications from Microsoft.
Sumedh Thorat has over 9 years of experience in technical support with expertise in ITIL, GDF, BMC Remedy, Active Directory, desktop support, MS Exchange, and SQL. He currently works as a Senior Practitioner Technical for IBM India on the SARM project. His responsibilities include customer care, managing the IT service desk, providing centralized technical support, working in the network operations center, and various roles within security asset and risk management including user ID validation and system registration management. He has received awards from IBM for his performance and contributions.
Sayan Biswas has 5 years of experience in data analytics and reporting. He writes complex SQL queries in Teradata and automates reporting. He analyzes data to make recommendations and drive actions. He is skilled in data analytics, Web Intelligence, Hadoop, Teradata SQL, and data visualization tools. He has multiple certifications in data technologies and leads a team of 14 analysts.
Gopinath Jaikumar has over 15 years of experience in storage administration, IT infrastructure support, and service delivery management. He is looking for a role as a team leader, service delivery coordinator, or client-facing delivery position where he can utilize his expertise in incident management, people management, and ITIL processes. He has a proven track record of successfully managing teams, meeting SLAs, and motivating employees.
Vinan Softech is an upcoming IT solutions company that delivers IT solutions and business processes to clients worldwide. It believes in passion, creativity, and quality. The company manages IT operations, including planning, security, maintenance, and ongoing improvement. It also manages human resources operations such as staffing, training, motivation, and maintenance. The company offers technical infrastructure, IT support services, and business propositions to understand clients' needs and provide customized solutions to enhance revenue and improve processes.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Full-RAG: A modern architecture for hyper-personalization
Shaleen shukla soc
1. Shaleen Shukla
About Me
August 04th, 1991
Total 5.4 years’ experience
Chennai, TN India
+91-7042376677
shaleenshukla4@gmail.com
SOC Analyst
With 5+ years of overall corporate experience in IT industry. Experienced, professional and dedicated to providing high
quality services as well as positive results. Well versed in workflow analysis and SIEM with proven ability to leverage
technology and achieve organizational objectives.
Education
Bachelor of Engineering (IT) Graduated, June 2014
Malwa Institute of Technology
Rajiv Gandhi Technical University, Bhopal (M.P.)
10+2(All India Senior School Certificate Examination) Passed, May 2010
St. Paul H.S. School
CBSE Board
Indore (MP)
10th (All India Secondary School Examination) Passed, May 2008
St. Paul H.S. School
CBSE Board
Indore (MP)
Career Highlights
• 3+ years of experience in SOC.
• 1+ years of experience in GAM.
• 1 years of experience as a Team Leader.
2. Work Experience
July’19-Current
Associate Consultant
Ernst & Young LLP
Chennai, TN India
Role: Level2 (L2) multiple customers SPOC
• Preparing daily, weekly, monthly reports for various trend activities of INCIDENTS.
• Attending weekly knowledge sharing session for emerging security threats conducting by EY MIST
facility.
• Worked on SIEM tool – IBM Qradar to monitor the traffic for any suspicious activity.
• Organize daily, weekly (Governance) call with Clients.
• Prepare Process Manuals for multiple Clients.
• Performing Redline Analyzing activities for Multiple Clients.
• Perform Malware Scan Analysis on Multiple Clients Machines.
• Gathering knowledge of top of emerging threats and vulnerabilities in IT security.
• Collect security incident metrics & data to enable reporting to senior management.
• Prioritization of alerts and incidents that exceed the SOC threshold.
• Collecting, analyzing and preserving the evidence related to incidents.
January’16-July’19
Information Security Analyst (May’19- July’19)
NTT Data Services (formerly Dell International Services)
Noida, UP India
Systems Support Senior Associate (April’16 – April’19)
NTT Data Services (formerly Dell International Services)
Noida, UP India
Role: Individual Contributor
• Capturing and analysis of all the data traffic through the network for all NTT Data clients using
SIEM tools.
• Log Analysis for all the possible threats including malware infections which have been alerted by
the SIEM.
• Monitor SOC (Security Operations Center) systems for incidents and malicious activity.
• Worked on SIEM tool - McAfee Nitro to monitor the traffic for any suspicious activity.
• Analyze security events and identify relevant incidents.
• Primary goal is to protect computer and telecommunication systems also to perform many tasks. •
Working with people at all levels of the organization to communicate the state of information
security, inform about possible risks and suggest ways to improve security.
• Appropriately inform and advise management on incidents and incident prevention.
• Preparing daily, weekly, monthly reports for various trend activities of INCIDENTS.
• Part of daily weekly call with Clients and US supporting teams.
• Good understanding of security devices like IDS, IPS, Firewalls, AV Logs for INCIDENT analysis.
3. April’15 – December’15
Role: Team Leader
• Worked under tight SLA on requests and incident while taking ownership of the process.
• Reviewed objectives and recommended required changes to senior team and prepared procedural
documents related to the process which led to smoothness in process.
• Good knowledge of laws/global best practices pertaining to data privacy and information security.
• Investigated and resolved security incidents in timely manner which resulted in customer
satisfaction and good reviews.
• Guided and trained multiple team members on the process. Recommended new ideas to other
teams which improved process for their respective clients.
• Developed and maintained detailed procedural processes that reduce redundancy, improve accuracy
and efficiency, and achieve organizational objectives.
• Provided immediate post-implementation problem solving, trouble shooting, and support as related
to security resulting in issue rectification.
• Awards and Recognition: 3 POM, 2 You Shine awards.
November’14 – March’15
Systems Support Associate
Dell International Services
Noida, India
Role: Individual Contributor
• Have been supporting complete User Account Administration infrastructure.
• Dealing with basic issues of Groups, OU’s, permissions and access.
• Good Knowledge of AD, DHCP, DNS, Group Policy and networking.
• Used OPAS V2 as the working console, and good understanding of ITIL process. •
Managing User & Groups (Properties and with respect to profile/application)
• Working on File/Folder Sharing & Security permissions issues.
• Incidents resolution Related to User account management, new user creation.
• Handling medium and low Tickets and provides solution as per SLA.
Skills
• SIEM Tools: IBM Qradar & McAfee Nitro, basic knowledge on Arcsight and Splunk. •
EDTR (Endpoint threat detection & response) Tool: Carbon Black.
• Ticketing Tools: Remedy 7.6 and Service Now
• Strong experience in GAM, AD, IBM Tivoli, Sales Force, JD Edwards and AS400.
• Working knowledge on vulnerability assessment and tools
• Good exposure on ITIL framework.
4. Strength and Core Qualification
• Capable of managing multiple tasks with an emphasis on retaining quality standards. •
Adaptability to dynamic working environment.
• Keen to learn new things and work on challenging tasks.
• Creative, innovative and have good interpersonal and communication skills.
• Ability to lead and work within a team in a collaborative manner.
• Ability to communicate on all levels of organization.
• Ability to quickly assess and prioritize projects and office tasks.
• Proficient at evaluating problems and quickly devising practical solutions.
• Information Security needs, assessment and planning.
• Ability to meet tight deadlines.
• Identifying process gaps and working on them to mitigate risks.
• Customer Service Management and team management.
Personal Details
Marital Status: Single
Gender: Male
Nationality: Indian
Declaration
I, Shaleen Shukla, hereby declare that the information contained herein is true and correct to the best of my
knowledge and belief.
____________________________
Shaleen Shukla