Summary
Overview
Work History
Education
Skills
Awards And Activities
Proficiencies
Programming Languages
Ethics
Problem Solving Skills
Related Course Work
Projects
Timeline
Generic

Sharvani Padisala

Cranberry Township,USA

Summary

Motivated Fraud Analyst touting 1 years of expertise investigating suspicious activity. Knowledgeable resource committed to finding answers and working with clients and interdepartmental personnel. Promoting exemplary skills in project management, analytics and fraud pattern detection. Relentless professional known for working hard to determine risk levels. A well-spoken Fraud Analyst promoting exemplary talents in reviewing accounts and identifying issues. Organized and dependable candidate successful at managing multiple priorities with a positive attitude. Willingness to take on added responsibilities to meet team goals. Hardworking and passionate job seeker with strong organizational skills eager to secure entry-level position. Ready to help team achieve company goals. To seek and maintain full-time position that offers professional challenges utilizing interpersonal skills, excellent time management and problem-solving skills. Detail-oriented team player with strong organizational skills. Ability to handle multiple projects simultaneously with a high degree of accuracy.

Overview

1
1
year of professional experience

Work History

Fraud Analyst

TekSystems
11.2023 - Current
  • Analyzed customer data to identify and prevent fraudulent activities.
  • Evaluated large volumes of data to detect patterns of fraud and anomalies.
  • Developed rules aimed at countering attacks while maintaining a positive customer experience.
  • Presented proposals to organizational leaders based on data analysis findings.
  • Evaluated the potential impact of proposed strategies on fraud prevention and customer satisfaction.
  • Explored alternative approaches to address emerging threats and challenges.
  • Collaborated closely with business partners throughout the process to ensure alignment with organizational goals.
  • Identified unusual patterns in suspicious cases through thorough data analysis.
  • Implemented measures to mitigate fraudulent activities without compromising customer experience.

Desktop Support Technician

Brooksource
09.2023 - 09.2023
  • A deep understanding of networks
  • Strong diagnostic capabilities and complete knowledge of Systems
  • Network issues and offer mobile device configuration
  • Analyze, develop, and implement security policies and provide Network and system security
  • Understanding of network and system security and threat intelligence awareness.
  • Utilized remote desktop tools effectively for off-site troubleshooting assistance when required.
  • Ensured seamless connectivity between devices by administering various networking components such as switches, routers, firewalls, and wireless access points.

Security Engineer

Trilok Software Solutions LLC
06.2023 - 11.2023
  • Developing and implementing security policies
  • Network and system security
  • Security audits and compliance
  • Security architecture and design
  • Security monitoring and threat hunting.
  • Collaborated with IT teams to integrate security measures into software development processes, enhancing overall application security.
  • Reviewed logs regularly to detect suspicious activity patterns before they escalate into full-blown incidents, enabling rapid response efforts when necessary.
  • Conducted regular penetration testing to identify vulnerabilities and address them proactively, strengthening system defenses.

Education

Associate of Science - General Studies

Community College of Allegheny County
Pittsburgh, PA

Bachelor of Science - Cyber Security

Robert Morris University
Pittsburgh, PA
05.2023

Skills

  • Problem-solving
  • Analytical thinking
  • Strong Communication
  • Teamwork
  • Professionalism
  • Security monitoring
  • Secure code analysis
  • Ethical hacking techniques
  • Penetration testing
  • Data Analysis
  • Fraud prevention and detection
  • Dispute Resolution

Awards And Activities

  • Dean's List Spring, Fall in the Year 2023
  • International Transfer Merit Scholarship Recipient
  • Cum laude graduate
  • May 2023 Global Award - for contributions at RMU Core value of Global perspective Center.
  • Top Secret Colonials Member
  • Indian Student Club Founder and Vice President.

Proficiencies

  • Network security
  • Cryptography
  • Risk assessment
  • Vulnerability management

Programming Languages

various

Ethics

True, True, True

Problem Solving Skills

True

Related Course Work

  • Digital Forensics
  • Program Computer & Network Security

Projects

Digital Forensics Project: Exploring Online Investigation Tools for Forensic Analysis, Analyzed Requirements, reviewed the information, logs, Implementation and documentation. Investigated data loss prevention methods, and coordination activities. Involved in Security assessment, network operations and security procedures. Used One Million Map Tweet Investigating tool. Informational Security Project: Designing and implementing a robust and secure IT system for Tel Star Inc., A startup manufacturing sensitive guidance systems for drone aircraft, to accommodate the company's projected expansion, strengthen network security against potential hackers, establish secure communication between two locations, and implemented effective security measures for employee credentialing and identification, while considering cost-effectiveness and efficiency.


 Cyber Security Capstone Project: The Rising Threat of Malware: Examining the SolarWinds Attack and Its Implications, The goal of my paper is to better understand the threats and challenges posed by malware and to provide information and recommendations for mitigating and overcoming these challenges. Research Project: Enhancing Home Security Systems: Addressing Challenges and Expanding Benefits AWS 


Capstone Project: Deploying and Configuring an Application Infrastructure with AWS, Testing and finding the errors and solving is my role in this group project. This project involves configuring and deploying a system infrastructure that includes an EC2 instance, RDS database, load balancer, and security groups. The objective is to establish a secure and functional environment for hosting a web application and accessing a database.

Timeline

Fraud Analyst

TekSystems
11.2023 - Current

Desktop Support Technician

Brooksource
09.2023 - 09.2023

Security Engineer

Trilok Software Solutions LLC
06.2023 - 11.2023

Associate of Science - General Studies

Community College of Allegheny County

Bachelor of Science - Cyber Security

Robert Morris University
Sharvani Padisala