Devang Chaudhary

Devang Chaudhary

Team Leader

Followers of Devang Chaudhary362 followers
location of Devang ChaudharyBirmingham, Inggris, Britania Raya

Connect with Devang Chaudhary to Send Message

Connect

Connect with Devang Chaudhary to Send Message

Connect
  • Timeline

  • About me

    Cyber Security Engineer | Bachelor's in Computer Network and Security

  • Education

    • FIITJEE

      2017 - 2018

      Activities and Societies: I was preparing for JEE mains and JEE Advanced for Indian institute of technology with computer streams.

    • Kendriya vidyalaya

      2005 - 2018
      A level Junior High/Intermediate/Middle School Education and Teaching
    • Birmingham City University

      2021 - 2023
      Bachelor's degree computer network and security

      Activities and Societies: Indian society Hackaton Modules:Systems Security Attacks and Defences, Innovation Project, Applied Operating Systems, Mathematics for Computing, Computer Systems, Server Systems, Network Fundamentals, Enterprise network system. Network Technologies, Programming for Network Engineers, Enterprise Network Systems, Enterprise Practice Project, Computer Programming.

  • Experience

    • Subway UK & Ireland

      Feb 2019 - Mar 2020
      Team Leader

      • Displays a friendly and accommodating demeanor when interacting with customers and taking their orders (skill: communication).• Demonstrates thorough knowledge of menu items and provides guests with precise explanations. (Aptitude: Rapid Learner)• During the shift, performs the cash-in procedure, including accounting for all kinds of payment and food (experience: accounting).• Checks the items in the sandwich unit area and restocks them to guarantee a supply that will last the entire shift (experience: inventory management). Show less

    • Getir

      Oct 2021 - May 2022
      Warehouse Team Member

      • I worked as an delivery driver in Getir as an E-biker where I packed and deliver the ordered items to the customer home. • Delivering packages and items along predetermined paths to customers.• Communicating with route dispatchers on a regular basis.• With the recipients, go over delivery to make sure they're accurate.• Getting customer delivery confirmations.• helping at the backdoor and the warehouse.

    • S B COMPONENTS

      May 2022 - now

      Responsibilities• Implemented Security Information and Event Management (SIEM) Systems using Splunk to meticulously monitor, analyze, and detect security flaws, ensuring a proactive response to security events, logs, and alerts. • Configured and monitored Firewall and Intrusion Prevention Systems, employing Cisco ASA and Palo Alto technologies, to control network traffic, prevent unauthorized access, and meticulously develop and enforce comprehensive security policies and procedures. • Deployed, managed, and monitored antivirus solutions, including McAfee and Windows Defender, to safeguard endpoints from malware, ensuring robust protection and continuous threat detection. • Utilized advanced Vulnerability Assessment Tools such as Nessus and OpenVAS to systematically identify and assess vulnerabilities within systems and networks, enabling a comprehensive approach to risk management. • Implemented state-of-the-art Encryption Technologies, including OpenSSL and BitLocker, to secure data both at rest and in transit, ensuring the confidentiality and integrity of sensitive information. • Monitored network activities for suspicious behavior through Network Security Monitoring (NSM) using Wireshark, enabling real-time analysis and identification of potential security threats. • Conducted ethical hacking and penetration testing using cutting-edge tools such as Metasploit, Burp Suite, and OWASP Zap, ensuring a thorough evaluation of security measures and identifying vulnerabilities for proactive mitigation. Show less Implemented Security Information and Event Management (SIEM) Systems using Splunk to meticulously monitor, analyze, and detect security flaws, ensuring a proactive response to security events, logs, and alerts. Monitored network activities for suspicious behavior through Network Security Monitoring (NSM) using Wireshark, enabling real-time analysis and identification of potential security threats. • Conducted ethical hacking and penetration testing using cutting-edge tools such as Metasploit, Burp Suite, and OWASP Zap, ensuring a thorough evaluation of security measures and identifying vulnerabilities for proactive mitigation.• Configured and monitored Firewall and Intrusion Prevention Systems, employing Cisco ASA and Palo Alto technologies, to control network traffic, prevent unauthorized access, and meticulously develop and enforce comprehensive security policies and procedures. Show less

      • Cyber Security Engineer

        Jun 2023 - now
      • Cyber Security Technician

        May 2022 - Jun 2023
  • Licenses & Certifications