- Strong skills in performing Functional Testing, Regression Testing, Load Testing, Performance Testing, Stress Testing, System Testing, User Acceptance Testing and Black Box testing.
- Familiar with tools such as Wireshark, Spirent Abacus 5000, PuTTY and PuTTY manager, Smart bits, SIPP, SipSak, TCPReplay, IPerf, Net Map, Quick Test Pro 10 and 11, Selenium.
- Extensively used standard Unix services like SSH, FTP and TELNET
- Structured wiring, electronics, soldering, UTP cable crimping and testing, GP - IB bus configuration for test equipment automation.
- Experience in developing Test Cases, Test Scripts and use of combinatorial testing methods.
- Technical writing: user manuals, test and configuration procedures, how-to documents, test plans, detailed bug reports, status reports, test result reports and product data reports based on lab test results.
- Experience on VOIP application and SIP, SSL, RADIUS, SNMP, DHCP, HTTP.
- Configured test environment on VMware Server and VirtualBox.
- Good understanding of AAA and Radius authentication/ port-Based / Mac-based and 802.1 X authentications process, Muti-Factor Authentication.
- Rich working experience on VOIP protocols (SIP), exposure to many open source tools used to test VOIP products and implementations
- General Knowledge on NMS/EMS Testing SNMP MIB Browsing.
- Familiar with the following security systems: McAfee Vulnerability Manager, McAfee Database Security Vulnerability Manager, McAfee ePolicy Orchestrator, Algosec Firewall Analyzer and Fireflow Workflow Manager, RedSeal Network Advisor & Vulnerability Advisor, Secure Passage Firemon, Skybox Compliance Auditor & Risk Exposure Analyzer and Tufin Secure Track & SecureChange Workflow.
Operating Systems: MS Windows 95/98/NT/2000/XP/Vista/2007, Red Hat Linux, Many flavors of Linux, Unix (HP, Sun), VMware, Oracle VM Virtual Box
MS Office: MS Word, MS Excel, MS Project, MS OneNote, MS Outlook, MS Infopath, MS PowerPoint, MS Visio, MS Publisher
Databases: Oracle 11g, Oracle RAC, Microsoft Access
Languages: C, C++, Perl, VBA, LabView, Linux/Unix Shell, DOS Shell, Perl, Awk, XML, HTML, SQL, VB Script
Platforms(IDE): Microsoft Visual Studio Express, Eclipse, Kdedevelop, OpenPerlIDE, gcc, make, nmake, Sablime, Oracle SQL Developer, NIST Advnced Combinatorial Testing Tool (ACTS)
Test Case Tools: NIST Advnced Combinatorial Testing Tool (ACTS), NIST Combinatorial Coverage Measurement tool.
Test Tools: Iperf, Jperf, SnmpB MIB Browser, Wireshark/Tshark, TCPdump, tcpreplay, NetStumbler, Webmin, Nmap, SIPp
QA Test Contractor
- BroadWorks Element Management System (EMS) trap and alarm test case planning, development and testing.
- Enterprise Business Service (EBS) Common Operations Portal( ECOP) to Customer Care Portal testing.
- Customer Care Portal test case planning, development and test execution.
- Premier Portal feature testing.
- Performance Management Operations Support System (PMOSS) testing.
- BroadWorks Application Server, Network Server, Media Server, Provisioning Server, Call Detail Server configuration script and shell verification using PuTTY, PuTTY Manager, perl and expect. Scripts configure, update and rollback the servers configured for development, system test, ITN, PSL and production.
- Network Element Activation Manager (NEAM) Testing.
- Call Flow Testing
- Test Standard Method and Procedure (SMOP) document used by production administrators to migrate enhanced call logs (ECL) from the BroadWorks Call Detail Server (CDS) to the BroadSoft DBS Oracle RAC servers.
- Test SMOP for Restoring EFFS DS ECL Database from Primary backup files. The Broadworks Data Servers operate as geo-redundant Oracle RAC clusters. Each EFFS site (Dallas and Denver) contains a pair of HS22 BladeServers configured to run as a local Oracle RAC cluster, which hosts the Broadworks Data Server application.
- Introduced use of Oracle SQL Developer for verifying the correct records were entered into the EFFS Oracle databases. Wrote how-to for the ST teams in EFFS, EVAS, development and ITN to configure and use the tool.
- Uncovered major performance and reliability issues with ST’s EFFS DS Oracle Rack servers while performing failover testing. It turned out to be a Linux kernel issue, but it escalated to VP level with many status meetings involving BroadSoft and Oracle engineers working on the issue until it was resolved.
- Verified EFFS enterprise rehome SMOP for migrating one or more enterprises from one AS cluster to another. This involved the BroadWorks Element Management System User Migration Management application and shell scripts. Worked closely with the main configuration developer to convert the BroadSoft manual rehome SMOP into an Confidential &T rehome SMOP with many steps automated with shell scripts.
- Configure, test and provide a detailed lab report for McAfee based on their McAfee Vulnerability Manager 7.0, McAfee Database Security Vulnerability Manager 4.0.0 and McAfee ePolicy Orchestrator 4.5.0. The test bed environment consisted of a Dell PowerEdge 1950 using VMware ESX Server V3.5.0 with Windows XP clients and Windows 2003 server running the McAfee services.
- Configure, test and provide detailed comparisons of network security applications for a Network World magazine article. Developed the evaluation methodology, then convinced vendors to agree and performed the evaluations of Algosec Firewall Analyzer & Fireflow Workflow manager, RedSeal Network Advisor & Vulnerability Advisor, Secure Passage Firemon, Skybox Compliance Auditor & Risk Exposure Analyzer and Tufin SecureTrack & SecureChange Workflow.
- Conducted a best practices audit to determine security policy compliance on a VXworks5.5 based turret securities trading system telecommunications interface. A large bank purchased a large securities trading firm and upgraded their turret phone trading system equipment. The device provided interfaces to turrets, intercom modules, recording equipment, VoIP equipment (SIP/H323), databases, maintenance and code updates. The security standards covered connectivity, authorization, and voice communications security. Required the ability to interpret the standards and trace the code to determine if the implementation met compliance requirements.