Shakira Muhammed Kunhi
Mobile: +965-69692267, Kuwait
Email: shahaza313@gmail.com
Career Objective:
Professional, detail-oriented System Security Analyst motivated to continuously learn
and grow within the Security field of technology.
Summary of Skills:
      Experienced in identifying potential threats and ensuring security of network
       systems
      Strong knowledge of system, network security, log analysis, and intrusion
       detection technologies
      Expert in taking quick action on cyber threat intelligence
      Superior knowledge of TCP/IP, firewalls, routers, and network protocols and
       technologies
      Excellent communication, organization, and troubleshooting skills
      Expert in project management, risk assessment, and security audits
Education
    Master of Engineering in Computer Science and Information security, LBS COLLEGE OF
     ENGINEERING, KASARAGOD, KERALA, INDIA(CGPA: 9.0) Year: 2015-2017
    Bachelor of Engineering in Computer Science and engineering, COLLEGE OF
     ENGINEERING TRIKARIPUR, INDIA (Percentage: 81.09) Year: 2005-2009
Professional Certification
        EC-COUNCIL Certified Ethical Hacker (CEHv9) 2017
        EC-COUNCIL Computer Hacking Forensic Investigator (CHFI v9) 2017
        Diploma in Java from NIIT Bangalore , 2010
Academic Research Work
Title of the project: Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud
Using seed Block algorithm
Language used : Java
Description          : With the advent of cloud computing, data owners are motivated to
outsource their complex data management systems from local sites to the commercial public
cloud for great flexibility and economic savings. Considering the large number of data users and
documents in the cloud, it is necessary to allow multiple keywords in the search request and
return documents in the order of their relevance to these keywords. The Data owner initially
segments the files. Applying seed block algorithm differently in each fragments, then encrypts it
using AES algorithm. Storing these file fragments in different buckets in cloud. During searching
users enters a keyword the server will give the corresponding matching files. Thus the proposed
system offers more security, integrity and data recovery.
Technical Skills
    Framework:                        Metasploit.
    Methodologies :                   OWASP Top 10
    Security Tools:            Nmap,Zenmap,Nmap-Scripting
     Engine,Nessus,Burpsuit,Wireshark,shodan,medusa,SqLMap,BurpSuite,Hydra,W
     afw00f.
    Database:                         SQL fundamentals (MYSQL, MS Sql, PostgreSQL).
    Languages :                       Python, JAVA and C
Work Experience:
Information Security Analyst
ASTRIX TECHNOLOGIES PVT LTD
January 2010 – September 2011, Bangalore
      Monitored security systems for any and all signs of Intruders or fraudulent
       activity.
      Carrying out vulnerability assessment, network scanning and Penetration
       Testing.
      Analyzing the machine to check the status of security in an organization.
      Resolved all fraud and virus infections in coordination with computer security
       incident response teams.
Computer Science Professor
LBS College of Engineering, Kasaragod, India
September 2011 –January 2012
             Initiated facilitated and moderated computer science related course
       discussions in accordance of curriculum
             Planned designed and revised syllabi curriculum instruction content and
       other materials as required
             Provided student body with counsel and direct supervision in laboratory
       work and issues with course work
             Stayed abreast of advancements in computing technology programming
       and syntax
      Information Security Analyst
      Spiceland Holidays Pvt Ltd., Kochi, Kerala, India
      February 2012-May 2015
            Monitor computer networks for security issues.
            Investigate security breaches and other cyber security incidents.
            Install security measures and operate software to protect systems and
             information infrastructure, including firewalls and data encryption
             programs.
            Document security breaches and assess the damage they cause.
            Work with security team to perform tests and uncover network
             vulnerabilities.
            Fix detected vulnerabilities to maintain a high-security standard.
            Stay current on IT security trends and news.
            Develop company-wide best practices for IT security.
            Perform penetration testing.
            Help colleagues install security software and understand information
             security management.
            Research security enhancements and make recommendations to
             management.
            Stay up-to-date on information technology trends and security standards.
Personal Information
     DOB:              15/09/1987
     SEX:              Female
     Marital Status:   Married
     Nationality:      India
     Visa Status:      Transferable