SlideShare une entreprise Scribd logo
1  sur  7
1.
RESUME – PKI - Certificate Management
Sreedhar Roddam
Mail id: Sreedhar.vs7@gmail.com Phone: +91 9379509959
OBJECTIVE
To work in a challenging environment that provides opportunity to learn key technologies, be an effective team player and
to be an asset for the organization by delivering to the best of my capabilities.
SUMMARY
Career Profile:
To develop a career as an Information Security Analyst in a growing company where my skills and experience will
be utilized in achieving the goals and objectives of the organization.
Process followed: Adhering to ITIL Processes for Incident, Change and Problem Management to handle all technical events
of the infrastructure.
Summary of Skills:
Company : IBM India Pvt Ltd
Professional Experience Details
Objective:
To move into higher technology area which provides an environment of self-expression, learning and to improve my
analytical and technical abilities.
Details of Employment / Projects
IAM: Identity and Access Management: (Security and Risk Management) -IBM India Pvt Ltd
Client: BHP Billiton (World’s Third Largest Organization)
Project#1 Project Name:
PKI - Certificate Management Digital certificate & SSL Server certificate Management
 Create ADAM account for the new users (New User, Modification, Delete) on ADAM server.
 Issue third part authentication digital certificate to install on vendor's machine.
 Encryption and/or sender authentication of e-mail messages (e.g., using OpenPGP or S/MIME)
• Encryption and/or authentication of documents (e.g., the XML Signature [2] or XML Encryption [3]
standards if documents are encoded as XML)
• Authentication of users to applications (e.g., smart card logon, client authentication with SSL). There's
experimental usage for digitally signed HTTP authentication in the Enigform and mod_openpgp projects
• Bootstrapping secure communication protocols, such as Internet key exchange (IKE) and SSL. In both of
these, initial set-up of a secure channel (a "security association") uses asymmetric key—i.e., public key—
methods, whereas actual communication uses faster symmetric key—i.e., secret key—methods.
 Provide telephonic support at the time of installation.
 Import and Export user's digital certificate keys.
 Issue SSL certificate for servers.
 Provide telephonic support to install SSL certificate on server and reverse proxy server.
 Send reminder mail for renewal.
Project#3
Name: Secure Email Certificate Management
Roles & Responsibilities – Security Administration
 Add the new user on secure email group in Active Directory.
 Troubleshooting - VeriSign secure email encryption certificate on user's Machine remotely.
 Key synchronization on user's Blackberry.
 Encryption keys backup and key recovery of the user.
 Outlook setup
 Telephonic support.
Project#4
Governance Platform Management :
• IdentityIQ Governance Platform capabilities include:
• Providing enforces access policy across access certification, access request management, password management
and provisioning processes.
• A Role Modeler that provides flexible options to model business and IT roles and manages role lifecycles.
• A calculating and assigning dynamic identity risk scores to users and systems.
• Ensure requirements gathered, processes defined, and use cases documented follow out of the box configuration
vs. customization as much as possible
Working on below task :
• Access control
• Cloud computing
• Digital identity management
• Password manager
• Workflow automation
• Provisioning
• Single sign-on
• Security Token Service
• Role based access control
• Risk management
• Create a new role of the new role type.
Project#5
Project Name: Token Authentication management
Roles & Responsibilities – Security Administration
 Token User id Creation on Token server. (New user, Modification, Delete)
 Token license procurement.
 Upload the tokens on server.
 Issue requested privilege.
 Manage the tech bridge for Token issue.
Project#6
BHPB Reporting:
 Preparing Reports (Daily, Weekly and Monthly), Daily Stats.
 Daily Production Report, Issue Tracker.
 Documentation.
 Preparing Reports.
 I worked in Word, PowerPoint, Excel, formatting tables/charts and Pivot tables.
• INCEIDENT MANAGEMNET DAILY ACTIVITIES - PROFILE
• Having 6 years of professional experience in IT Security ( IAM & Incident, change, problem management ) as
Senior Security Analyst.
• Ability to solve complex problems in a simple and accurate manner.
• Good command over spoken and written communication in English.
• Flexibility, strategic problem solver with good time management skills
• Highly skilled in IT Security products.
• Experience in handling of all kind priority Incidents tickets and analyzing the issue and taking appropriate action
within SLA.
• Incident detection and recording, Classification and initial support, Investigation and analysis, Resolution and
recovery, Incident closure, Incident ownership, monitoring, tracking and communication. Establish incident
framework management, Evaluation of incident framework management and resolving Incidents.
• Experience in checking that, the incident has not already been logged: it is commonplace for more than one user to
report an incident, so it is necessary to check to avoid unnecessary duplication, the incident will be assigned a
reference number to uniquely identify it in both internal processes and when communicating with the customer.
The basic information needed to process the incident (time, description of the incident, systems affected, etc.) has
to be entered on the associated database.If any relevant information for the resolution of the incident that may be
asked for from the customer using a specific form, or which may be obtained from the CMDB (interrelated
hardware), etc. Incident notification: in those cases where the incident may affect other users, these should be
notified so that they are aware of how the incident may impact their usual workflow.
• Experience in register and classify received Incidents and to undertake an immediate effort in order to restore a
failed IT service as quickly as possible. If no ad-hoc solution can be achieved, 1st Level Support will transfer the
Incident to expert technical support groups (2nd Level Support). 1st Level Support also keeps users informed about
their Incidents' status at agreed intervals.
• Experience in preparing the document based on Incident and complete resolution history, and identifies
opportunities for improving the handling of future Major Incidents.
• Escalation regarding the processing of an Incident or Service Request, initiated by a user experiencing delays or a
failure to restore their services.
• Experience in solving an Incident (service interruption) within the agreed time schedule. The aim is the fast
recovery of the service, where necessary by means of a Workaround. If required, specialist support groups or third-
party suppliers (3rd Level Support) are involved. If the correction of the root cause is not possible, a Problem
Record is created and the error-correction transferred to Problem Management.
• Experience in analyzing incidents that have occurred in order to discover their causes and propose solutions to
them. Monitoring the quality of the IT infrastructure and analyzing its configuration in order to prevent incidents
even before they happen.
• Experience in Using Ticketing tools like Maximo, manage now and Quest.
• Asset management or Asset Tracking of all IT related devices and machines in the organization.
• Experience in Making and deliver the reports which are supposed to be sent to the customer and Understanding
the process and delivery best service to the customers.
• Experience in supporting 24/7 work environment.
Problem Management
• Experience in diagnose the root cause of incidents identified through the Incident Management process,
and to determine the resolution to those problems. It is also responsible for ensuring that the resolution is
implemented through the appropriate control procedures, especially Change Management and Release
Management.
• Used to maintain information about problems and the appropriate workarounds and resolutions, so that
the organization is able to reduce the number and impact of incidents over time. In this respect, Problem
Management has a strong interface with Knowledge Management, and tools such as the Known Error
Database will be used for both. Although Incident Management and Problem Management are separate
processes, they are closely related and will typically use the same tools, and may use similar
categorization, impact and priority coding systems. This will ensure effective communication when dealing
with related incidents and problems. Identify, verify, and elevate "New" issues based on new request.
Operations management is an area of management concerned with overseeing, designing, and controlling the
process of production and redesigning business operations in the production of goods or services. Involves the
responsibility of ensuring that business operations are efficient in terms of using as few resources as needed, and
effective in terms of meeting customer requirements and handles Request for Change activity
Change Management
• Accepting the Changes
, Prioritize and classify changes
, Coordinate change impact assessment
, Coordinate approval of changes
, Coordinate scheduling of changes
,Coordinate implementation of changes
,provide management information about Change Management quality and operations
. Managing reports.
Details of Employment / Projects
Company : Infosys
Location : Bangalore
Period : June 2007 to May 2011
Designation : Process Specialist
Project#1
Project Name : Application Security Administrator/ Trainer/ System Administrator
Key Responsibilities:
• Installation, Configuration, Maintenance of McAfee Server EPO 4.x and Mcafee Virus Scan Enterprise 8.x.
• Configure the policies for Server and Client from McAfee ePolicy Orchestrator server.
• Maintaining the DAT updates in the Server & initializing the updates to all managed Client.
• Manually updating the DAT to the unmanaged clients.
• Installing the Symantec Endpoint Protection suite 11.0 & Small Business Suite 12 and configuring the Policies as
customer requirement.
• Troubleshooting the Problems and Submitting non-detected malwares to the Respective Team and resolving the
Issues.
• Installing, configuring and troubleshooting the Kaspersky, CA Total Defense antivirus including the server and
clients & activating the licenses.
• Implementing Software and hardware fault tolerance techniques and troubleshooting the issue with documenting
the records.
• Designing the Installation, configuration the policies in Technical Documents.
• Follow-ups with Mails for client related problems and exalted the virus issue in the client places.
• Daily/weekly visiting to the client places and solves the client’s related problems and installation for the latest
update for the antivirus and the servers.
Summary of Skills: Active Directory.
• Creation/Deletion/Maintenance of Windows Accounts through Active Directory
• Upgraded the Active Directory system to the Windows 2008 to incorporate design.
• Studied various documents and applied new technologies to the existing system.
• Add the new user on secure email group in Active Directory.
• Designed the measurements for auditing and quality assurance.
• Supported the enterprise level application by windows plumbing.
• Maintained a record of all the security changes and modifications made to the system.
• To improve quality of service and business support.
• Followed steps of Incident Management(IM), which involves logging of defects
• Identify, Resolution, Closure and maintain incident management and daily report update to management.
• Prioritizes the incident & Change depending upon the customer requirements .
• Provide excellent customer service and delivery of technology services.
• Updating documents which will be helpful in eliminating process disconnects.
Achievements
 Awarded “Individual Extra Miler
 Sport awards for Highest Production
 One STAR OF Year award for top performance.
 Have exceeded expectations in 4 Consecutive appraisals.
TECHNICAL SKILLS
• Extensive knowledge of Platforms in Microsoft Windows desktop & Servers
• Proficient in the use of Security products like McAfee, Symantec, Trend Micro.
• Familiar in Technical documentation and knowledge sharing.
• Windows server 2008, Windows 2003 Server Platforms, Windows7, Windows XP,
Windows 2000.
Professional Activities and trainings
 Epolicy Orchestrator 4.5 (MSA-103.02 EN)
 Endpoint Encryption PC 6.0 (Technical)
 McAfee Virus Scan 8.7i Enterprise (MSA 101.07 EN)
 ITIL v3 internal certification- IBM
 Trained in CEH
 Completed identity manager courses @ IBM.
 Completed ITIM Foundation course @ IBM(Internal Training)
Education
• B.sc in S.D.G.S College at S.K University.
• Enrolled in MBA- Personal Area at Dravidian University.
PERSONAL DETAILS
Name : Sreedhar Roddam
Address : 50/1, HNO 9, Near Milk dairy, behind Govt School, channasandra
Bangalore-560067
Nationality : Indian
Gender : Male
Languages Known : English, Kannada, Telugu and Hindi
DECLARATION
I do hereby declare that the above mentioned particulars are true to the best of my knowledge and belief.
Sreedhar Roddam
 Endpoint Encryption PC 6.0 (Technical)
 McAfee Virus Scan 8.7i Enterprise (MSA 101.07 EN)
 ITIL v3 internal certification- IBM
 Trained in CEH
 Completed identity manager courses @ IBM.
 Completed ITIM Foundation course @ IBM(Internal Training)
Education
• B.sc in S.D.G.S College at S.K University.
• Enrolled in MBA- Personal Area at Dravidian University.
PERSONAL DETAILS
Name : Sreedhar Roddam
Address : 50/1, HNO 9, Near Milk dairy, behind Govt School, channasandra
Bangalore-560067
Nationality : Indian
Gender : Male
Languages Known : English, Kannada, Telugu and Hindi
DECLARATION
I do hereby declare that the above mentioned particulars are true to the best of my knowledge and belief.
Sreedhar Roddam

Contenu connexe

Tendances

Incident Management
 Incident Management Incident Management
Incident Managementiicecollege
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAGeorge Delikouras
 
Incident Management Best Practices
Incident Management Best PracticesIncident Management Best Practices
Incident Management Best PracticesTechExcel
 
TY CS Black book Construction - Dinesh48
TY CS Black book Construction - Dinesh48TY CS Black book Construction - Dinesh48
TY CS Black book Construction - Dinesh48Dinesh Jogdand
 
ITIL and Autotask: Incident & Problem Management
ITIL and Autotask: Incident & Problem ManagementITIL and Autotask: Incident & Problem Management
ITIL and Autotask: Incident & Problem ManagementAutotask
 
ITIL Incident Management Workflow - Process Guide
	 ITIL Incident Management Workflow - Process Guide	 ITIL Incident Management Workflow - Process Guide
ITIL Incident Management Workflow - Process GuideFlevy.com Best Practices
 
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft Private Cloud
 
Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major IncidentNUS-ISS
 
Furniture Management System
Furniture Management SystemFurniture Management System
Furniture Management SystemWeTheCoders
 
Hedging the process
Hedging the processHedging the process
Hedging the processDATA Inc.
 
Sumeet Kumar Dwivedi_Metadata_Manager
Sumeet Kumar Dwivedi_Metadata_ManagerSumeet Kumar Dwivedi_Metadata_Manager
Sumeet Kumar Dwivedi_Metadata_Managersumeetsdm
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
New resume for AW & BB
New resume for AW & BBNew resume for AW & BB
New resume for AW & BBanant punekar
 

Tendances (20)

Saipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_VitaeSaipraveen_Cirrculum_Vitae
Saipraveen_Cirrculum_Vitae
 
Incident Management
 Incident Management Incident Management
Incident Management
 
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
 
Hands on IT risk assessment
Hands on IT risk assessmentHands on IT risk assessment
Hands on IT risk assessment
 
PTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIAPTX12_Presentation_George Delikouras AIA
PTX12_Presentation_George Delikouras AIA
 
Incident Management Best Practices
Incident Management Best PracticesIncident Management Best Practices
Incident Management Best Practices
 
TY CS Black book Construction - Dinesh48
TY CS Black book Construction - Dinesh48TY CS Black book Construction - Dinesh48
TY CS Black book Construction - Dinesh48
 
ITIL and Autotask: Incident & Problem Management
ITIL and Autotask: Incident & Problem ManagementITIL and Autotask: Incident & Problem Management
ITIL and Autotask: Incident & Problem Management
 
ITIL Incident Management Workflow - Process Guide
	 ITIL Incident Management Workflow - Process Guide	 ITIL Incident Management Workflow - Process Guide
ITIL Incident Management Workflow - Process Guide
 
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop Whitepaper
 
Managing a Major Incident
Managing a Major IncidentManaging a Major Incident
Managing a Major Incident
 
Mobile shopping
Mobile shoppingMobile shopping
Mobile shopping
 
Furniture Management System
Furniture Management SystemFurniture Management System
Furniture Management System
 
Hedging the process
Hedging the processHedging the process
Hedging the process
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 
Sumeet Kumar Dwivedi_Metadata_Manager
Sumeet Kumar Dwivedi_Metadata_ManagerSumeet Kumar Dwivedi_Metadata_Manager
Sumeet Kumar Dwivedi_Metadata_Manager
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
New resume for AW & BB
New resume for AW & BBNew resume for AW & BB
New resume for AW & BB
 
Anirban_Resume
Anirban_ResumeAnirban_Resume
Anirban_Resume
 
CISSP - Security Assessment
CISSP - Security AssessmentCISSP - Security Assessment
CISSP - Security Assessment
 

Similaire à PKI Certificate Management

ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industryHappiest Minds Technologies
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder
 
Preetam_Resume_Business Analyst
Preetam_Resume_Business AnalystPreetam_Resume_Business Analyst
Preetam_Resume_Business AnalystPreetam Sahu
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notesedwinlorenzana
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the HourTechdemocracy
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
Vishal Guleria (ITIL Certified) IT Service Management Lead Updated Resume
Vishal Guleria (ITIL Certified) IT Service Management Lead Updated ResumeVishal Guleria (ITIL Certified) IT Service Management Lead Updated Resume
Vishal Guleria (ITIL Certified) IT Service Management Lead Updated ResumeVishal Guleria
 
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...Johnny Dennis
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Net at Work
 
Janhvi_singh_resume_24-Aug-2016
Janhvi_singh_resume_24-Aug-2016Janhvi_singh_resume_24-Aug-2016
Janhvi_singh_resume_24-Aug-2016JANHVI SINGH
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Software India
 

Similaire à PKI Certificate Management (20)

ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
Preetam_Resume_Business Analyst
Preetam_Resume_Business AnalystPreetam_Resume_Business Analyst
Preetam_Resume_Business Analyst
 
Securing Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation NotesSecuring Citizen Facing Applications Presentation Notes
Securing Citizen Facing Applications Presentation Notes
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Mayank-Tamrakar
Mayank-TamrakarMayank-Tamrakar
Mayank-Tamrakar
 
Gnanaguru
GnanaguruGnanaguru
Gnanaguru
 
Resume
ResumeResume
Resume
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Anita_Resume_2014_09
Anita_Resume_2014_09Anita_Resume_2014_09
Anita_Resume_2014_09
 
Ayyappan_CV
Ayyappan_CVAyyappan_CV
Ayyappan_CV
 
Vishal Guleria (ITIL Certified) IT Service Management Lead Updated Resume
Vishal Guleria (ITIL Certified) IT Service Management Lead Updated ResumeVishal Guleria (ITIL Certified) IT Service Management Lead Updated Resume
Vishal Guleria (ITIL Certified) IT Service Management Lead Updated Resume
 
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
Johnny_Dennis_Leadership_Information_Security_Identity_Access_Management - Li...
 
Harbindar Singh_Resume
Harbindar Singh_ResumeHarbindar Singh_Resume
Harbindar Singh_Resume
 
Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!Endpoint Security & Why It Matters!
Endpoint Security & Why It Matters!
 
Kiran_CV
Kiran_CVKiran_CV
Kiran_CV
 
Janhvi_singh_resume_24-Aug-2016
Janhvi_singh_resume_24-Aug-2016Janhvi_singh_resume_24-Aug-2016
Janhvi_singh_resume_24-Aug-2016
 
Madhu Sudhan
Madhu SudhanMadhu Sudhan
Madhu Sudhan
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
 
Vinny Panwar
Vinny PanwarVinny Panwar
Vinny Panwar
 

PKI Certificate Management

  • 1. 1. RESUME – PKI - Certificate Management Sreedhar Roddam Mail id: Sreedhar.vs7@gmail.com Phone: +91 9379509959 OBJECTIVE To work in a challenging environment that provides opportunity to learn key technologies, be an effective team player and to be an asset for the organization by delivering to the best of my capabilities. SUMMARY Career Profile: To develop a career as an Information Security Analyst in a growing company where my skills and experience will be utilized in achieving the goals and objectives of the organization. Process followed: Adhering to ITIL Processes for Incident, Change and Problem Management to handle all technical events of the infrastructure. Summary of Skills: Company : IBM India Pvt Ltd Professional Experience Details Objective: To move into higher technology area which provides an environment of self-expression, learning and to improve my analytical and technical abilities. Details of Employment / Projects IAM: Identity and Access Management: (Security and Risk Management) -IBM India Pvt Ltd Client: BHP Billiton (World’s Third Largest Organization) Project#1 Project Name: PKI - Certificate Management Digital certificate & SSL Server certificate Management  Create ADAM account for the new users (New User, Modification, Delete) on ADAM server.  Issue third part authentication digital certificate to install on vendor's machine.  Encryption and/or sender authentication of e-mail messages (e.g., using OpenPGP or S/MIME) • Encryption and/or authentication of documents (e.g., the XML Signature [2] or XML Encryption [3] standards if documents are encoded as XML) • Authentication of users to applications (e.g., smart card logon, client authentication with SSL). There's experimental usage for digitally signed HTTP authentication in the Enigform and mod_openpgp projects • Bootstrapping secure communication protocols, such as Internet key exchange (IKE) and SSL. In both of these, initial set-up of a secure channel (a "security association") uses asymmetric key—i.e., public key— methods, whereas actual communication uses faster symmetric key—i.e., secret key—methods.  Provide telephonic support at the time of installation.  Import and Export user's digital certificate keys.  Issue SSL certificate for servers.
  • 2.  Provide telephonic support to install SSL certificate on server and reverse proxy server.  Send reminder mail for renewal. Project#3 Name: Secure Email Certificate Management Roles & Responsibilities – Security Administration  Add the new user on secure email group in Active Directory.  Troubleshooting - VeriSign secure email encryption certificate on user's Machine remotely.  Key synchronization on user's Blackberry.  Encryption keys backup and key recovery of the user.  Outlook setup  Telephonic support. Project#4 Governance Platform Management : • IdentityIQ Governance Platform capabilities include: • Providing enforces access policy across access certification, access request management, password management and provisioning processes. • A Role Modeler that provides flexible options to model business and IT roles and manages role lifecycles. • A calculating and assigning dynamic identity risk scores to users and systems. • Ensure requirements gathered, processes defined, and use cases documented follow out of the box configuration vs. customization as much as possible Working on below task : • Access control • Cloud computing • Digital identity management • Password manager • Workflow automation • Provisioning • Single sign-on • Security Token Service • Role based access control • Risk management • Create a new role of the new role type. Project#5 Project Name: Token Authentication management Roles & Responsibilities – Security Administration  Token User id Creation on Token server. (New user, Modification, Delete)  Token license procurement.  Upload the tokens on server.  Issue requested privilege.
  • 3.  Manage the tech bridge for Token issue. Project#6 BHPB Reporting:  Preparing Reports (Daily, Weekly and Monthly), Daily Stats.  Daily Production Report, Issue Tracker.  Documentation.  Preparing Reports.  I worked in Word, PowerPoint, Excel, formatting tables/charts and Pivot tables. • INCEIDENT MANAGEMNET DAILY ACTIVITIES - PROFILE • Having 6 years of professional experience in IT Security ( IAM & Incident, change, problem management ) as Senior Security Analyst. • Ability to solve complex problems in a simple and accurate manner. • Good command over spoken and written communication in English. • Flexibility, strategic problem solver with good time management skills • Highly skilled in IT Security products. • Experience in handling of all kind priority Incidents tickets and analyzing the issue and taking appropriate action within SLA. • Incident detection and recording, Classification and initial support, Investigation and analysis, Resolution and recovery, Incident closure, Incident ownership, monitoring, tracking and communication. Establish incident framework management, Evaluation of incident framework management and resolving Incidents. • Experience in checking that, the incident has not already been logged: it is commonplace for more than one user to report an incident, so it is necessary to check to avoid unnecessary duplication, the incident will be assigned a reference number to uniquely identify it in both internal processes and when communicating with the customer. The basic information needed to process the incident (time, description of the incident, systems affected, etc.) has to be entered on the associated database.If any relevant information for the resolution of the incident that may be asked for from the customer using a specific form, or which may be obtained from the CMDB (interrelated hardware), etc. Incident notification: in those cases where the incident may affect other users, these should be notified so that they are aware of how the incident may impact their usual workflow. • Experience in register and classify received Incidents and to undertake an immediate effort in order to restore a failed IT service as quickly as possible. If no ad-hoc solution can be achieved, 1st Level Support will transfer the Incident to expert technical support groups (2nd Level Support). 1st Level Support also keeps users informed about their Incidents' status at agreed intervals. • Experience in preparing the document based on Incident and complete resolution history, and identifies opportunities for improving the handling of future Major Incidents. • Escalation regarding the processing of an Incident or Service Request, initiated by a user experiencing delays or a failure to restore their services. • Experience in solving an Incident (service interruption) within the agreed time schedule. The aim is the fast recovery of the service, where necessary by means of a Workaround. If required, specialist support groups or third- party suppliers (3rd Level Support) are involved. If the correction of the root cause is not possible, a Problem Record is created and the error-correction transferred to Problem Management. • Experience in analyzing incidents that have occurred in order to discover their causes and propose solutions to them. Monitoring the quality of the IT infrastructure and analyzing its configuration in order to prevent incidents even before they happen. • Experience in Using Ticketing tools like Maximo, manage now and Quest. • Asset management or Asset Tracking of all IT related devices and machines in the organization.
  • 4. • Experience in Making and deliver the reports which are supposed to be sent to the customer and Understanding the process and delivery best service to the customers. • Experience in supporting 24/7 work environment. Problem Management • Experience in diagnose the root cause of incidents identified through the Incident Management process, and to determine the resolution to those problems. It is also responsible for ensuring that the resolution is implemented through the appropriate control procedures, especially Change Management and Release Management. • Used to maintain information about problems and the appropriate workarounds and resolutions, so that the organization is able to reduce the number and impact of incidents over time. In this respect, Problem Management has a strong interface with Knowledge Management, and tools such as the Known Error Database will be used for both. Although Incident Management and Problem Management are separate processes, they are closely related and will typically use the same tools, and may use similar categorization, impact and priority coding systems. This will ensure effective communication when dealing with related incidents and problems. Identify, verify, and elevate "New" issues based on new request. Operations management is an area of management concerned with overseeing, designing, and controlling the process of production and redesigning business operations in the production of goods or services. Involves the responsibility of ensuring that business operations are efficient in terms of using as few resources as needed, and effective in terms of meeting customer requirements and handles Request for Change activity Change Management • Accepting the Changes , Prioritize and classify changes , Coordinate change impact assessment , Coordinate approval of changes , Coordinate scheduling of changes ,Coordinate implementation of changes ,provide management information about Change Management quality and operations . Managing reports. Details of Employment / Projects Company : Infosys Location : Bangalore Period : June 2007 to May 2011 Designation : Process Specialist Project#1 Project Name : Application Security Administrator/ Trainer/ System Administrator Key Responsibilities: • Installation, Configuration, Maintenance of McAfee Server EPO 4.x and Mcafee Virus Scan Enterprise 8.x.
  • 5. • Configure the policies for Server and Client from McAfee ePolicy Orchestrator server. • Maintaining the DAT updates in the Server & initializing the updates to all managed Client. • Manually updating the DAT to the unmanaged clients. • Installing the Symantec Endpoint Protection suite 11.0 & Small Business Suite 12 and configuring the Policies as customer requirement. • Troubleshooting the Problems and Submitting non-detected malwares to the Respective Team and resolving the Issues. • Installing, configuring and troubleshooting the Kaspersky, CA Total Defense antivirus including the server and clients & activating the licenses. • Implementing Software and hardware fault tolerance techniques and troubleshooting the issue with documenting the records. • Designing the Installation, configuration the policies in Technical Documents. • Follow-ups with Mails for client related problems and exalted the virus issue in the client places. • Daily/weekly visiting to the client places and solves the client’s related problems and installation for the latest update for the antivirus and the servers. Summary of Skills: Active Directory. • Creation/Deletion/Maintenance of Windows Accounts through Active Directory • Upgraded the Active Directory system to the Windows 2008 to incorporate design. • Studied various documents and applied new technologies to the existing system. • Add the new user on secure email group in Active Directory. • Designed the measurements for auditing and quality assurance. • Supported the enterprise level application by windows plumbing. • Maintained a record of all the security changes and modifications made to the system. • To improve quality of service and business support. • Followed steps of Incident Management(IM), which involves logging of defects • Identify, Resolution, Closure and maintain incident management and daily report update to management. • Prioritizes the incident & Change depending upon the customer requirements . • Provide excellent customer service and delivery of technology services. • Updating documents which will be helpful in eliminating process disconnects. Achievements  Awarded “Individual Extra Miler  Sport awards for Highest Production  One STAR OF Year award for top performance.  Have exceeded expectations in 4 Consecutive appraisals. TECHNICAL SKILLS • Extensive knowledge of Platforms in Microsoft Windows desktop & Servers • Proficient in the use of Security products like McAfee, Symantec, Trend Micro. • Familiar in Technical documentation and knowledge sharing. • Windows server 2008, Windows 2003 Server Platforms, Windows7, Windows XP, Windows 2000. Professional Activities and trainings  Epolicy Orchestrator 4.5 (MSA-103.02 EN)
  • 6.  Endpoint Encryption PC 6.0 (Technical)  McAfee Virus Scan 8.7i Enterprise (MSA 101.07 EN)  ITIL v3 internal certification- IBM  Trained in CEH  Completed identity manager courses @ IBM.  Completed ITIM Foundation course @ IBM(Internal Training) Education • B.sc in S.D.G.S College at S.K University. • Enrolled in MBA- Personal Area at Dravidian University. PERSONAL DETAILS Name : Sreedhar Roddam Address : 50/1, HNO 9, Near Milk dairy, behind Govt School, channasandra Bangalore-560067 Nationality : Indian Gender : Male Languages Known : English, Kannada, Telugu and Hindi DECLARATION I do hereby declare that the above mentioned particulars are true to the best of my knowledge and belief. Sreedhar Roddam
  • 7.  Endpoint Encryption PC 6.0 (Technical)  McAfee Virus Scan 8.7i Enterprise (MSA 101.07 EN)  ITIL v3 internal certification- IBM  Trained in CEH  Completed identity manager courses @ IBM.  Completed ITIM Foundation course @ IBM(Internal Training) Education • B.sc in S.D.G.S College at S.K University. • Enrolled in MBA- Personal Area at Dravidian University. PERSONAL DETAILS Name : Sreedhar Roddam Address : 50/1, HNO 9, Near Milk dairy, behind Govt School, channasandra Bangalore-560067 Nationality : Indian Gender : Male Languages Known : English, Kannada, Telugu and Hindi DECLARATION I do hereby declare that the above mentioned particulars are true to the best of my knowledge and belief. Sreedhar Roddam