Education
Skills
Technical Knowledge
Other Technical Knowledge
Work Experience
Timeline
SeniorSoftwareEngineer
MOURYA GOTTUMUKKALA

MOURYA GOTTUMUKKALA

Ellicott City,MD

Education

Masters - CyberSecurity

Hood College
Frederick, MD
05.2024

Bachelor of Technology - Electronics And Communications Engineering

Amrita Vishwa Vidyapeetham
Coimbatore, India
03.2022

Skills

  • Hierarchy and fundamentals of Linux and Windows Systems
  • Networking
  • Audits & Compliance
  • Critical Thinking and Analysis
  • Entity Management Skills
  • Bussiness Analysis
  • HealthCare Facility Management
  • Risk Analysis and management
  • Documentation
  • Metasploit Frameworks for exploitation
  • Information Gathering
  • Leveraging protocols
  • Exploring Vulnerabilities
  • Incident Response

Technical Knowledge

Networks:

  • Network Administration: Proficient in network administration tasks, including configuring routers, switches, and firewalls, ensuring network security, and managing user access.
  • Protocol Architecture: Strong understanding of network protocol architecture, including TCP/IP, UDP, HTTP, DNS, and FTP, with the ability to troubleshoot and analyze network protocols.
  • OSI Model: In-depth knowledge of the OSI model and its seven layers, enabling effective troubleshooting and communication within complex network environments.
  • Network Traffic and Flow Analysis: Skilled in monitoring and analyzing network traffic and flows using tools like Wireshark and NetFlow to optimize network performance and security.
  • Low-Level Packet Analysis: Proficient in low-level packet analysis to diagnose network issues, ensuring smooth data transmission.
  • Building Networks in GNS3: Competent in designing and building network topologies using GNS3 for testing, simulation, and training purposes, enabling realistic network modeling and experimentation.
  • Setting Up DHCP Servers: Experienced in configuring and managing DHCP servers to automate IP address allocation, enhancing network efficiency.

Penetration Testing:

  • Methodologies and Steps: Proficient in penetration testing methodologies, including information gathering, scanning & footprinting enumeration, and exploitation.
  • Hands-On Projects: Maintained a personal lab for cybersecurity skill development, actively exploiting vulnerabilities, engaging in practical exercises, and conducting penetration tests on internal systems. Completed four major projects, including privilege escalation exploits.
  • Tools and Technologies: Showcased proficiency in utilizing a diverse range of cybersecurity tools, leveraging Nmap and Zenmap for precise network discovery and scanning, Metasploit for expert penetration testing and exploitation, Wireshark for meticulous network packet analysis, Burp Suite for rigorous web application security testing, and John the Ripper for precise password cracking.
  • Scanning and Footprinting: Demonstrated mastery excelling in scanning techniques and footprinting to pinpoint vulnerabilities within networks and systems. Skillfully leveraged Nmap and other scanning tools to meticulously assess target system ports, services, and perform in-depth analysis.
  • Enumeration and System Hacking: Proficient in precise enumeration techniques to extract valuable insights from target systems. Demonstrated ability to execute system hacking strategies effectively, Privilege escalation methods to attain full system control.
  • Social Engineering: Adept in executing precise social engineering techniques to obtain confidential information and emphasizing the role of social engineering awareness in security assessments.
  • Malware and Vulnerability Analysis: In-depth knowledge on malware, viruses, Trojan analysis, and their types and effects. Proficient in understanding the creation, deployment, and functionality of these threats based on their specific characteristics.

Computer and Network Forensics:

  • Investigated Crime Image Disk: Conducted a forensic examination of a criminal image disk file, using industry-standard tools like FTK and FTK Imager, alongside Registry Viewer, to extract, analyze, and present digital evidence.
  • Comprehensive Reporting: Generated detailed forensic reports that presented findings and insights.
  • Steganography: Proficient in finding hidden information within digital files using steganography tools, enhancing the ability to detect concealed data during investigations.

Risk Management:

  • Risk Assessment: Proficient in conducting comprehensive risk assessments, identifying vulnerabilities, and evaluating security controls to mitigate potential threats.
  • Risk Assessment Methodology: Experienced in utilizing industry-standard risk assessment methodologies, such as NIST SP 800-30 and ISO 27005, to assess and prioritize security risks.
  • Risk Assessment Project: Conducted a comprehensive risk assessment for a simulated organization, identifying critical vulnerabilities and recommending risk mitigation strategies.
  • Vulnerability Management Initiative: Skilled in developing and implementing risk management strategies and frameworks to safeguard critical assets and data.
  • Compliance Standards: Familiarity with compliance standards such as GDPR, HIPAA, and PCI DSS, ensuring adherence to regulatory requirements and data protection.

Security Policies, and Laws: 

  • Laws and regulations: In-depth understanding of cybersecurity laws and regulations like to GDPR, HIPAA, PCI DSS, and CCPA.
  • Policies and procedures: Proficient in developing and enforcing comprehensive cybersecurity policies, procedures, and guidelines aligned with industry standards and regulatory requirements.
  • Audits: Knowledgeable in planning, executing, and overseeing comprehensive security audits and assessments to evaluate the effectiveness of cybersecurity controls.
  • Standards: Familiar with industry-standard audit methodologies and tools used to assess network security, system configurations, and data protection measures.
  • Compliance: Expertise in identifying and interpreting relevant compliance mandates, tailoring security measures to address specific legal obligations, and consistently ensuring the organization's adherence to cybersecurity laws and policies.

Other Technical Knowledge

Programming: Python, SQL, My SQL

Security: Encryption, Data Base Security, Drive and Disk Security, Reviewing Security logs in Forensics, Threat Analysis, Setting Up VPN for internal and external networks, Risk Management, Policies and Compliance.

Tools: John the Ripper, Metasploit, Wireshark, Netflow, Ftk, Ftk imager, Registry Viewer, Kali Linux, Google Hacking, Nmap, Zenmap, Netcap, Microsoft office suite, Matlab, AutoCad, Xilinx.

Other: Digital Signal Processing, Control Systems, Microprocessor, Microcontroller, Circuits and Communication, VLSI designs, Workshop on MSP432 launchpad using energia MT.

Work Experience

Datla Services, Silver Spring, MD.                                                                  June 2022 - Present

Manager, Security Consultant, Business Advisory Consultant.

  • Assisted Living Manager, Certified by Office of Healthcare Quality Maryland (OHCQ)
  • Successfully implemented assessments on use cases to enhance operational effectiveness.
  • Managed six Assisted Living facilities under Datla Services, known as Atrium Assisted Living.
  • Supervision on iCare Manager software which have resident's personal and medical data, Also helps in managing day-to-day operations to ensure compliance.
  • Proficient in risk assessment, healthcare compliance, auditing, and providing business advisory and security consulting.
  • Modified business Policies based on assessments done on use cases to streamline operational processes, Resulted in highest level of care for residents.

Syntax Pro IT Consulting Services, Ellicott City, MD.                                 June 2022 - Present

Business Advisory Consultant.

  • Part of Decision Making, Coordinating Audits and Documentation.
  • Domain, Email and Web Administrator.
  • Provided strategic business advisory services, offering valuable insights and recommendations to enhance operational efficiency,

Timeline

Masters - CyberSecurity

Hood College

Bachelor of Technology - Electronics And Communications Engineering

Amrita Vishwa Vidyapeetham
MOURYA GOTTUMUKKALA