[var] => cut_url
<pre>Array ( [var] => cut_url ) </pre> Resume for Chitkala A. for Other / Computer Software in Bangalore City, India. Search More Resumes for Other on #D2O7CZ9VY

Search Resumes

Post Jobs

Job Seekers:
Post Your Resume


Resume for Chitkala A. for Other / Computer Software in Bangalore City, India

Occupation: Other Industry: Computer Software
Country: India City: Bangalore City
State: Karnataka ZIP: 560043

View Complete Resume   Download Resume [
    [name] => cut_url
Share Share

< Back to search results Preview: For the complete resume and contact info please download it.

    [var] => content
    [type] => preview
    [var] => cut_url
Seeking a challenging career with a progressive organization which will utilize my skills in IT security and
willingness to learn and help others to make an organization successful.
At a Glance
• years of experience in IT in which yrs in Application Security.
• Currently working as an IT Consultant at Tata Consultancy Services, Bangalore as a Key
person and received good accolades from the VP of the Ameriprise security and Risk Management
in a short span of time.
• Worked as an Associate Consultant at ITC Infotech, Bangalore.
• Point of contact between development team and auditing team as well as only point of contact for
client interactions during Application Security audits in ITC Infotech.
• Certified Security Consultant.
• Around year of work experience in Application Consulting & Engineering Team ACE
Team at Microsoft Corporation.
• Around + years of experience in developing web applications using .NET
Technical Skills
|Security Tools |Burp, TamperIE, Webscarab, Wireshark, |
| |Fiddler, MBSA, FXCop |
|Front End Tools |Visual Studio.Net, Visual Basic . |
|Databases |MS SQL Server , MySql |
|Application and Web Server |Microsoft IIS . |
|Operating System |WindowsX/K/XP |
|Internet Technology |HTML, XML |
Professional Qualifications
|Degree |University/Board |Percentage |Year of Passing |
|Master in Computer |IGNOU | | |
|Application | | | |
|B.Sc Computers |Nagarjuna University | | |
|Intermediate |Board of Intermediate | | |
| |Education | | |
|SSLC |Andhra Pradesh Board of | | |
| |Secondary Education | | |
• Certified Ethical HackerCEH
• GIACSANS Web Application Security Certification
Experience Summary
• Working as an IT Consultant in Tata Consultancy Services from Mar till date.
• Worked as an Associate IT Consultant in ITC InfoTech, Bangalore from February to Feb
• Worked as a Security Consultant & Developer at Vempower, Hyderabad from
April, to Jan in which one year i.e. from Nov to Nov of
Work experience as a Security Specialist in ACE Team at Microsoft Corporation,
• Worked as a Software Engineer Dark horse Technologies, Hyderabad from
April, to March, .
• Worked as Software Trainee at CLSOFT, Hyderabad from December, to
March, .
Projects Undertaken
|Major Assignments: |
|Tata Consultancy Services , Bangalore Mar – Till date |
|Client :Ameriprise |
Project Name: Security Risk Management Oct till date
The project involves in handling of Exceptions, Standards Refresh and Application Security Web
Applications VTA.
My responsibility areas:
. Analyzing the Exceptions requested by the client against the compliance with Ameriprise standard
or policies. This analysis is completely on the risk based strategy.
. Security Consultancy to clients
. Review and refresh the Ameriprise standards with respect to current Industry standards like NIST
whenever it is required.
. Application Penetration Testing Web applications, providing Mitigation Strategies.
• Security consultant
Project Name: SOX Compliance
Mar – Sep
The project involves in handling of User Access Controls of the Applications which comes under SOX
critical. User Access controls deals with Ameriprise privileged users for the SOX critical applications, user’s
transfers and terminations requests.
• Security consultant
|Major Assignments: |
|ITC InfoTech, Bangalore Feb – Feb |
Project Name: Application Security Audit
Feb – Feb
In this project till now I have assessed nearly web application, application architecture study for
probable application security threats. It basically involves finding of various business risks, preparing audit
reports with recommendations and helping the development team in mitigating these risks.
• Application Security consultant
Tools Used: Burp, Fiddler, Tamper IE, WebInspect etc.
Project Name: Infrastructure Audit
Jan Feb
In this project till now I have audited Windows , HPUnix, AIX and Linux servers Infrastructures, which
basically involves finding of various business risks, generating audit reports with recommendations and
helping the Infrastructure team in mitigating these risks.
• Security Auditor
• Single point of contact for External Infrastructure Audits
Tools Used: Foundstone, Paladion
|Major Assignments: |
|Vempower, Hyderabad Dec Jan |
Project Name: ASAP Application Software Assurance Program Nov Nov
Client: Microsoft Corporation, India
The Application Software Assurance Program aims in securing the Line of Business LOB applications
developed at Microsoft as per the Microsoft’s Security Policy, Standards and Best Practices.
• Meetings with members of the application development teams to understand the overall
application architecture, design and its related development processes
• Analysis of full application code for security vulnerabilities.
• Analysis of the operating system platform, database, network, and
system services used by the application for new security and privacy
• Reviews of the application and associated processes with respect to
security and privacy policies and standards.
Tools Used: TAM, Product Studio, TamperIE, Fiddler, FXcop, Appassurance Application level, and
Microsoft Network Monitor.
Software used: IOSEC, TRUSTEE
Project Name: Application Security Training Module
Dec – Jan
Client: Internal
Development of a training application, which is mainly meant to train the developer from the security
perspective. It’s an online training kit containing sufficient materials for the .NET developer to develop
highly secured application.
Some of the main features the application addressed are:
• Most important vulnerabilities of OWASP

Not Enough Credits
Sorry, but you don't have enough credits to download this resume.

Purchase more credits
Not Available
Sorry but this resume is not available for download. Please choose another!

Confirm Download

Would you like to download  for 1 credit?

You have  credits left.

Yes No 

Don't ask me again
Confirm View Complete Resume

Would you like to view  for 1 credit?

You have  credits left.

Yes No 

Don't ask me again