Hello! I’m a Network Engineering enthusiast who believes in the power of good connections - and I’m not just talking about routers and switches! When I’m not busy untangling network complexities, you’ll find me immersed in the world of gaming. After all, life’s all about finding the perfect balance, just like load balancing in a network!
Provided comprehensive troubleshooting for complex customer environments and the entire Verkada platform, including network, hardware, software, and electrical issues. Educated customers on system setup, collaborated with engineers to resolve bugs, and provided valuable feedback for product enhancement. Authored knowledge base articles and offered expertise in best practice design, installation, and configuration to enterprise clients. Actively collaborated with Engineering and Product teams to test new products.
Managed and monitored SIG’s Physical and ESXi infrastructure, addressing system alerts and failures. Enhanced monitoring capabilities by integrating Intel PCM features into SIG’s framework using Python, Grafana, and Graphite DB. Successfully diagnosed and resolved packet loss issues in the virtual ESXi environment.
Network Equipment Management - Backup, Restore, Replace and Upgrade Cisco/Arista/Juniper network equipment such as Routers, Switches, Firewalls and Load Balancers Device Management: Maintaining all the hardware in the lab such as IP Phones, VOIP Routers, Patch-cords are working and available to use
Developed cloud automation services to handle disaster recovery on AWS instances. Managing automated deployment of dymanically created and configured EC2 Instances. Created APIs to generate status reports for EC2 instances and integrated it with the company Intranet.
Worked on an open source project - Threat Report ATT&CK Mapping (TRAM) using python and javascript.It is a tool to aid analysts by automatically mapping cyber threat intelligence reports to MITRE ATT&CK. It enables researches to test and refine ML models for identifying ATT&CK techniques in prose-based threat intel reports.
Researched on applications of data mining techniques such as Regression,Classification, Prediction and Association in Apache Spark and Python.Inspected the Sentiment Analysis model to understand the social sentiment of the brand and service while monitoring online conversations.
Interfaced theoretical Chemistry and computer programs to calculate the structures and properties of molecules and solids.Designed Python and C based models for numerical simulation of Molecular Spectroscopy under Quantum Mechanical Basis.
Fall 2022:
◦ Network Systems, Introduction to Enterprise Networks, Voice over Internet Protocol (VoIP)
Spring 2023:
◦ Network Virtualization and Orchestration , Network Management and Automation,
IP Routing Protocols and Policies
Fall 2023:
◦ Advanced Network Automation and Management, Datacenter Networks, Software Defined Networking
Coursework: Network Tools and Techniques, Network Systems, Linux Programming,Data Structures,Design and Analysis of Algorithms, Operating Systems, Theory of Computation, Programming in C/C++
Developed a project that integrates with Asterisk, that allows an user to perform remote logfile manipulation with voice commands using real time voice recognition.
Implemented an end-to-end encrypted authentication schema using Python. The Application is safe in an insecure network from common attacks such as man in the middle attack and phishing attacks.
Designed and developed an open source end-to-end encrypted File transfer application using NodeJS. Users can register themselves with the service and start using the application. Application utilized modern day encryption standards like RSA-4096 bit and AES-256 bit.
Developed an Android Application in Kotlin using Android Studio with Google Firebase. Application emulates offline transaction of currency and reflects it directly onto the bank account of the user using the Unified Payment Interface (UPI) Gateway.
Devised an application to identify irregularities in road pavements using Android Studio and Python as the front-end and back-end respectively. Reverse Geocoded data was obtained on the handheld device using Here Maps API to Plot the sudden irregularities on OpenStreetMaps.
Presented an augmentation technique - AdaBelief Wasserstein Generative Adversarial Network-Gradient Penalty (ABWGAN-GP) to generate random adversarial samples and Spatial Graph Convolutional Network(ABWGAN-GP-SGCN) to detect the anomalous behavior of systems in a network to identify insider threats. The proposed methodology was validated using the CMU CERT dataset. The experimental result proves that minority adversarial samples generated have lower discriminator loss and identify the anomaly with higher precision.