Now you can Instantly Chat with John!
About Me
To solve problems effectively in a challenging environment and seeking a responsible job with an opportunity for professional growth. Highly motivated to grow in the field of technology and benefit to my employer with my knowledge, domain skills and ...
Show MoreSkills
Portfolio Projects
Description
RisqVU IST provides a highly effective command and control center for
security managers. Remediation for critical issues can be automated and also
triggered on demand. Actions can include service shutdown, rogue process
termination, account disablement, and more. You can even run advanced
simulations to find and fix problems before they occur. RisqVU IST providing
users with both agent (EDR) and agent less telemetry based information
security solution that addresses the constant advancements in cyber attacks.
RisqVU IST also addresses the need for situational awareness, allowing for
open communication and focus on the security posture of an organization.
Description
U.S. Department of Homeland Security (DHS) Automated Indicator Sharing
(AIS) enables the exchange of cyber threat indicators between the Federal
Government and the private sector. Threat indicators are pieces of information
like malicious IP addresses or the sender address of a phishing email. AIS
participants connect to a DHS-managed system in the Department’s National
Cybersecurity and Communications Integration Center (NCCIC) that allows
bidirectional sharing of cyber threat indicators. AIS leverages the Structured
Threat Information [removed]STIX) and Trusted Automated Exchange of
Indicator Information (TAXII) specifications for machine-to-machine
communication.
Description
RSA Authentication Manager software is the management component and
engine behind the RSA SecurID industry-leading two-factor user
authentication technology. It is used by more than 30 million end users
worldwide to verify authentication requests and centrally administer user
authentication policies for access to enterprise resources. Designed to fit the
needs of organizations of all sizes, RSA-AM software is built upon an
enterprise class multi-processor architecture that is capable of handling from
as few as twenty-five users to millions of users per server and hundreds of
simultaneous authentications per second. RSA-AM offers high performance
and scalability with enterprise-level management such as database replication,
logging, reporting, native LDAP support and web-based management. The
database replication feature enables flexible network configuration and load
balancing for improved performance that ultimately enables to manage
policies and lifecycle of keys and tokens across the infrastructure.
Description
This Web application stands as a medium in between Sales and Approval
management teams collaboration. This system is developed to provide on hand
details of all the commodities available at the click of the mouse along with
association of the suppliers who supply those commodities and purchasers
who dwell their business process with the ongoing suppliers who are in the
list. The registered organization whenever the necessity arises can port
themselves by migrating onto the application and get through their
requirements by just clicking on the information that available. As part of this
project, I have been part of designing and developing User Interfaces using
JSP, HTML. Implemented Data Access Objects and Data Transfer Object
design patterns. Along with Coding also completed Unit Testing. Involved in
debugging, bug fixing of the application.
Description
MDR Agent provides a highly effective command and control center for security managers. Remediation for critical issues can be automated and also triggered on demand. Actions can include service shutdown, rogue process termination, account disablement, and more. MDR Agent providing users with both agent (EDR) and agent less telemetry based information security solution that addresses the constant advancements in cyber-attacks. MDR Agent also addresses the need for situational awareness, allowing for open communication and focus on the security posture of an organization.
Show More Show LessDescription
U.S. Department of Homeland Security (DHS) Automated Indicator Sharing (AIS) enables the exchange of cyber threat indicators between the Federal Government and the private sector. Threat indicators are pieces of information like malicious IP addresses or the sender address of a phishing email. AIS participants connect to a DHS-managed system in the Departments National Cybersecurity and Communications Integration Center (NCCIC) that allows bidirectional sharing of cyber threat indicators. AIS leverages the Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indicator Information (TAXII) specifications for machine-to-machine communication
Show More Show LessDescription
RSA Authentication Manager Software is the management component and engine behind the RSA SecurID industry-leading two-factor user authentication technology. It is used by more than 30 million end users worldwide to verify authentication requests and centrally administer user authentication policies for access to enterprise resources. Designed to fit the needs of organizations of all sizes, RSA-AM software is built upon an enterprise class multi-processor architecture that is capable of handling from as few as twenty-five users to millions of users per server and hundreds of simultaneous authentications per second. RSA-AM offers high performance and scalability with enterprise-level management such as database replication, logging, reporting, native LDAP support and web-based management. The database replication feature enables flexible network configuration and load balancing for improved performance that ultimately enables to manage policies and lifecycle of keys and tokens across the infrastructure.
Show More Show Less