5+ years of IT work experience in Software Development with demonstrated history of working in a dynamic Agile and Scrum Software Development Life Cycle (SDLC) methodology Strong knowledge in developing applications using Angular, React, Node JS, AWS lambda, AWS amplify, AWS Cognito, AWS DynamoDB streams, Java, Spring, Hibernate, JavaScript, HTML, MySQL, Python, C, C++, REST API and SQL Extensive experience in developing database connectivity applications using Java JDBC, Spring JDBC template, and Hibernate, Maven and object-oriented analysis, modelling, and design Good in requirement gathering and conducting POC for latest technologies. Strong interpersonal and communication skills developed during client interactions
Languages: Java, JavaScript, C, Tools: Wireshark, Metasploit, SET C, Shell Scripting, Linux, toolkit
RESTful, Python, Node JS, React Source Control Systems: GIT,
Cloud Platform: AWS (Lambda, Gerrit
Cognito, Amplify, DynamoDB Defect Tracking systems:
streams) SonarQube, HP-Master Craft ALM
Frameworks: Angular JS,React, Task Management Systems:
Spring, Hibernate, Maven, JIRA
Bootstrap IDEs Software: Eclipse, Visual
Web Designing: XML, XSD, Studio
HTML, CSS, JSON, REST API Methodologies: Agile, Waterfall,
Containerization: Docker (novice) Software Development Life Cycle
Continuous Integration: AWS, (SDLC) Travis, Jenkins
Database Systems: PostgreSQL, Microsoft SQL Server
Phishing using Macros, 09/01/19, 12/31/20, Virtual Machines, Metasploit, SET toolkit, Used Macros in MS document to again access by creating reverse Http connection from victims' machine. Reverse Http connection is made by generating payload for MS document. Mailing the victim as an authorized user to again access to their personal machine as soon as he downloads and enable macros. Credit card fraud detection, 01/01/20, 04/30/20, Hadoop, phpMyAdmin, Credit card fraud detection is focus on money and location while doing online transaction. Developed separate modules in Java for User Authentication, Admin dataset Pre-process, Fraud Identification, Security Questions and for Pixel comparison by creating virtual machine using Ubuntu Operating System. Implemented two levels of security levels – Pixel Comparison, Security Questions. Utilized Hadoop MapReduce framework to process vast amounts of data into smaller set of tuples or key-value pairs. Created database in phpMyAdmin for storing image pixels, user credentials values.