Bhavin Patel

Bhavin Patel

Cyber Expert

Followers of Bhavin Patel821 followers
location of Bhavin PatelKitchener, Ontario, Canada

Connect with Bhavin Patel to Send Message

Connect

Connect with Bhavin Patel to Send Message

Connect
  • Timeline

  • About me

    Security Operations Analyst | esentire

  • Education

    • V.P&R.P.T.P Science college

      2018 - 2020
      BCA Computer Programming

      o Analyze system requirements for a variety of computer applications.o Design, input, extract, format, and report information from a database to end-userspecifications.o Use several different operating systems for the development and implementation of programsin business and technical environments.o Use several different types of tests for performing the quality software testing.o Employ multi-user databases in a variety of systems including financial, production… Show more o Analyze system requirements for a variety of computer applications.o Design, input, extract, format, and report information from a database to end-userspecifications.o Use several different operating systems for the development and implementation of programsin business and technical environments.o Use several different types of tests for performing the quality software testing.o Employ multi-user databases in a variety of systems including financial, production andmanufacturing systems.o Analyze and design an information system in an object-oriented environment.o Learned system development life cycle in the .NET programming.o Capstone Project: Podcast Application for computer geeks built in Angular, Ionic, PHP, Ionic,firebase, electron. Show less

    • Conestoga College

      2022 - 2023
      Information Technology and Network Security Information Technology 3.71/4

      o Design and implement security solutions considering the affordances and limitations of thecomputer operating systems, networks, and software available.o Comply with security policies, standards, and regulations typical to an organization in the designand implementation of security solutions.o Plan, implement, and evaluate security policies and strategies using project managementprinciples to effectively respond to the needs of the organization's information… Show more o Design and implement security solutions considering the affordances and limitations of thecomputer operating systems, networks, and software available.o Comply with security policies, standards, and regulations typical to an organization in the designand implementation of security solutions.o Plan, implement, and evaluate security policies and strategies using project managementprinciples to effectively respond to the needs of the organization's information securityrequirements.o Assess and test networked and virtualized IT systems with respect to security threats such as theft,damage, as well as alternation and/or interruption of services.o Install, configure, and troubleshoot system and network enhancements to promote security in anorganization.o Evaluate the effectiveness of a security system through security audits to identify and correctsecurity issues. Show less

    • Conestoga College

      2022 - 2022
      Computer application Security Information Technology GPA: 3.77/4

      • Remediate vulnerabilities in software applications based on security threats assessment and testing.• Design and develop security solutions for business processes and applications in order to protect business resources.• Develop plans to incorporate security into the software development process and integrate emerging technologies safely into new software products or computer systems• Develop policies and procedures that protect the property and privacy of the clients, owners… Show more • Remediate vulnerabilities in software applications based on security threats assessment and testing.• Design and develop security solutions for business processes and applications in order to protect business resources.• Develop plans to incorporate security into the software development process and integrate emerging technologies safely into new software products or computer systems• Develop policies and procedures that protect the property and privacy of the clients, owners, employees, and other stakeholders of an organization• Evaluate the effectiveness of a security system through security audits to identify and correct security issues.• Develop and deliver appropriate security training to ensure compliance with security policies.• Communicate security, protocols, policies, and audit results, and related documentation to any level of the organization.• Develop asset management and risk management plans to protect the physical and intellectual properties of an organization. Show less

  • Experience

    • Cyber Security India-CSI

      Sept 2019 - Sept 2021
      Cyber Expert

      • Utilized Splunk to collect, analyze, and visualize machine-generated data from various sources.• Configured data inputs in Splunk to ensure accurate and consistent data collection.• Developed complex search queries using Splunk's search language to perform data analysis and identify trends and patterns.• Created customized visualizations and dashboards in Splunk to present data in a meaningful way, aiding stakeholders in decision-making.• Set up alerts and reports in Splunk to monitor KPIs, notify stakeholders of important events, and ensure timely issue resolution.• Assisted Anand Police with cyber fraud investigations. Show less

    • Hacker 4 Help

      Dec 2020 - Dec 2022
      Penetration Tester

      • Conducted website penetration tests using tools like Nmap, Burp Suite, and Kali Linux to identify vulnerabilities such as Cross-Site Scription (XSS) and Cross Site Request Forgery (CSRF).• Performed security audits on client Android applications and APIs utilizing tools like Burp Suite, Gini Motion, Frida, and Objection to identify logic flaws.• Developed and maintained the company website using Angular and PHP.• Design and implement security solutions considering the affordances and limitations of the computer operating systems, networks, and software available.• Remediate vulnerabilities in software applications based on security threats assessment and testing.• Install, configure, and troubleshoot system and network enhancements to promote security in an organization. Show less

    • Conestoga College

      Jan 2023 - Apr 2023
      IT Service Desk Student Technician
    • ESentire

      Jul 2023 - now
      SOC Analyst 1
  • Licenses & Certifications