Security Solutions Engineer Intern Resume
4.00/5 (Submit Your Rating)
Chicago, IL
SUMMARY
- To acquire a position in teh engineering field that employs my widespread technical skill, problem solving noledge, and resourceful experience.
- My management, organizational, and interpersonal capabilities will add immense value to company services and solutions.
Professional Experience:
Security Solutions Engineer Intern
Confidential, Chicago, IL
Responsibilities:
- Exposure to penetration testing techniques for Windows and Linux environments.
- Defined and assisted in small - scale projects to improve operational efforts.
- Gained familiarity wif Open Web Application Security Project (OWASP) vulnerabilities.
- Provided feedback into teh Threat Defense platform and processes in order to increase teh detection fidelity and accuracy of teh Threat Defense solution.
- Cultivated an in depth understanding of HTTP, SMTP, SMB, LDAP, TCP, FTP, SSH, etc.
- Gained noledge of programming languages such as Python, Ruby, and Perl.
- Performed network and web application vulnerability assessments.
- Employed VMware and Active Directory to create virtual networks for penetration testing.
- Achieved working noledge of binary exploitation.
- Cooperated wif team members on wireless network vulnerability assessments.
- Utilized security tools such as Kali Linux, BurpSuite, and Wireshark for network analysis and exploitation.
- Provided vulnerability feedback to clients to improve network security posture.
- Assisted directors and principle engineers in requests for proposals to further business development.
- Collaborated wif account managers to author statement of work documentation.
Satellite Technician
Confidential, Savannah, GA
Responsibilities:
- Served as human customer interface for all system integration, troubleshooting and maintenance.
- Continuously improved expertise of Confidential Network Confidential .
- Conducted site surveys to plan optimal system integration.
- Onsite construction of 1000.2, 1000.4, 500, and international Confidential structures.
- Calibrated Confidential Pro Plus Twin Eastern Arc, Integrated Western Arc, 1000.4 Eastern Arc, and 500+ LNBF.
- Integrated and trunked Videopath multi- Confidential switches for system expansion.
- Utilized system components such as diplexers, integrators, separators, triplexers, splitters, solo nodes, duo nodes, ground blocks, RG-6 coax cable, and RG-6 connectors.
- Implemented Confidential Network troubleshooting techniques to resolve system issues.
- Managed personal warehouse, inventory, daily usage reports, company vehicle, and expense reports.
- Confirmed scheduled appointment wif client, documented site work, and assured completion of service and 2 year agreements via ETAdirect mobile software.
- Consistently exceeded teh monthly goal of $775 in smart home services up sales.
- Exposure to MPEG-4, MPEG-2, MoCA, and Video over IP applications.
Leasing Consultant
Confidential, Statesboro, GA
Responsibilities:
- Provided marketing strategies to promote Teh Grove apartment suites.
- Served as liaison for on campus prospecting at Georgia Southern University.
- Facilitated prospecting events at local businesses.
- Administered tours to solidify residential interest.
- Attained $390,000 in leasing sales.
- Accumulated tour reports of surrounding competition.
- Managed service requests, payments, and leasing documents submitted by current and potential residents.
Confidential
Responsibilities:
- Designed and implemented intrusion detection algorithms to enhance session, transport, network, data link and physical layer security in smart grid communication Confidential .
- Analyzed home, neighborhood, and wide area networks to optimize smart grid infrastructure.
- Researched countermeasures to improve detection rates of intrusion detection algorithms.
- Exploration of IDS algorithms in IPv4 and IPv6 address space.
- Deployed National Instruments Universal Software Radio Peripheral devices to create wireless test networks.
- Developed Moving Target Defense based IDS for network anomaly detection.
- Formulated a cosine similarity based IDS for spoofing detection in 802.11 and 802.15.4 networks.
- Designed synchronization signal jamming IDS for jamming attacks in 4G/LTE networks.
- Composed a Euclidean distance and packet loss rate based IDS for jamming detection in WLAN.