Competence

Competence

  • Data Privacy analysis and Data Protection Officer(DPO)
  • SIEM Infrastructure and management of SOC
  • Ethical Hacking, Red/Blue team activitites
  • IT security Analyzes (Threat/Vulnerability/Risk)
  • IT Security Architecture and standards
  • IT Security Assurance case assessment
  • PEN Testing, vulnerability analysis and system hardening
  • Domain separation, NTM, VPN, IPSEC, SSL, PKI
  • Encryption Algorithms And Security Protocols
  • OS / RTOS
  • Embedded development Linux for different OS / RTOS in C, C++ and Python
  • 3G / 4G R&D
  • 3G / 4G Integration & Trouble shooting
  • RNC/RBS/ NodeB/MGW User-plane/Control-Plane/Transport-Plane RANAP/RNSAP/RRC/SCTP/NBAP Location Area,UE Security, Paging,Cell-planning, Protocol termination, UE resource management
  • Development of event driven/Synchronous systems 1553, CAN, UDP, TCP, IP mm Freescale, ARM, Intel C, C ++, ADA
  • Model-based development in executable UML RTOS, Test
  • Continous integration Jenkins etc 
  • Version control CVS, Mercurial, Subversion, GIT
  • Methodology SCRUM LEAN KANBAN
  • Requirement management in DOORS
  • Project management
  • SCRUM Master

Post Your Comment Here