Specialist - Software Development Resume
3.00/5 (Submit Your Rating)
SUMMARY
- Experience in C programming on Linux, Windows.
- Good understanding of data structures and algorithms.
- In depth knowledge of Operating System concepts and Windows/Linux Internals.
- Experience in the area of data security and reverse engineering.
- Experience in automation scripting.
PROFESSIONAL EXPERIENCE
Confidential
Specialist - Software Development
Responsibilities:
- Working on a time series database product named FAME (Forecasting Analysis and Modeling Environment)
- Technologies: C, C++ Platforms: Windows, Linux, Solaris
- Responsible for feature enhancements, bug fixes, building and testing the software.
Confidential
Software Engineer
Responsibilities:
- Intel acquired Confidential 's Axxia networking business
- Merged with Intel's "Scalable performance CPU Development Group" under "Platform Engineering Group"
- The responsibilities remain mostly the same, some additional initiatives being discussed.
Confidential
Software Development Engineer II
Responsibilities:
- As a part of Confidential at LSI, I worked for the Content Security Processor team which looks after the Deep Packet Inspection module of the CSP platform.
- The technology provides a hardware based solution for inspecting network packets for patterns based upon rules in the form of regular expressions.
- Responsible for maintaining plus features development for the PCI drivers, user as well as kernel library for the platform.
- Unit testing of the features, integration and regression testing of customer product releases.
- Experience of handling end to end design, development and testing process.
- Additional responsibility of maintaining the code repository, build framework, customer bug fixes.
- Technology and platform: C, Linux
- Tools used: version management utilities (P4, git), Makefiles, toolchains.
Confidential
Associate Software Engineer
Responsibilities:
- Analyze the sets of files to determine if they are malicious or non-malicious, if they are, provide detection for them.
- Detections may be in the form of specific signatures or generic routine in assembly language or C, which is integrated to various products such as Norton Antivirus, Norton Internet Security and Norton 360 on an hourly basis.
- Static and dynamic analysis of samples using tools such as BETON, fileview, unpack, debundle, PEid.
- Reverse engineering files to determine their behavior, using debuggers like IDA Pro and OllyDBG.
- Develop automation scripts using Perl and Python. E.g. grouping of files based upon icons and size, PE file info etc.
- Generate XML scripts for remediation of side effects of the threats, which are integrated to Symantec ERASER engine on a daily basis.
Confidential
Threats Research Engineer
Responsibilities:
- Provide detection as well as repair routines in C language for all kind of upcoming malware, typically file infectors.
- These routines were integrated into products such as Quick Heal Antivirus, Quick Heal Internet Security and Quick Heal Total Security on a daily basis in the form of signatures.
- The routines were written in C language.
- So as to analyze the behavior of malware samples, perform static as well as dynamic analysis of the sample using tools such as Hex Editor, Sandboxie, CFF Explorer, Hiew, Sysinternal Tools etc.
- To determine the behavior of the particular malware, using debuggers such as IDA Pro or OllyDBG.
- Develop some tools in C language which will help automate tasks E.g. directory parser, log parser.