.
MEHUL SHAH
Mumbai, Maharashtra, India [email protected] 90826423877 https://www.linkedin.com/in/mehul.shah.7263846284
SUMMARY
I am a successful professional with a solid academic foundation and a depth of knowledge in cybersecurity and computer networking. I have
successfully negotiated the complexity of the digital environment thanks to my love for technology breakthroughs and my desire to maintain
secure and effective network infrastructure. My broad skill set and technological proficiency enable me to create and put into practice effective
cybersecurity solutions that safeguard sensitive data and shield enterprises from online attacks.
EDUCATION
Masters in Cybersecurity & Forensics
Parul University • Vadodara, Gujarat • 2023 • 8.08
Bachelor in Computer Science
Mumbai University • Dombivli • 2021 • 7.90
HSC(12th)
Mahila Samiti High School • Dombivli • 2018 • 56.00
SSC(10th)
Manjuntha Vidyalaya • Dombivli • 2016 • 63.60
EXPERIENCE
QA Automation Tester(Apprenticeship)
SCIKEY December 2022 - May 2023, Surat
• Proficient in designing, developing, and implementing automated test scripts using industry-standard automation testing tools such as
Selenium, Appium, or TestComplete.
• Extensive experience in creating and executing test cases to ensure the quality and reliability of software applications, identifying defects,
and collaborating with development teams to ensure timely resolution.
• Strong understanding of Agile and Scrum methodologies, enabling eicient collaboration with cross-functional teams to achieve continuous
integration and delivery while maintaining high-quality standards.
PROJECTS
Sphere(SuperSurvey)
SCIKEY • December 2022 - May 2023
Find The Hack
Parul University
Face Mask Detection
Self-Project
SKILLS
1. Technical Skills
1. Networking Skills
• Deep Understanding Of LAN, MAN, WAN, OSI Model, TCP/IP Protocol Suite (IPV4 Addressing, IPV6 Addressing, ARP), NAT, and Access-
list.
Routing protocols include: Link-State Routing Protocols, IGRP, EIGRP, RIP V1, RIP V2, OSPF, BGP, and RIP V2.
• Switching: Spanning Tree Protocol (STP), VLAN Trunk Protocol (VTP), Virtual Local Area Network (VLAN), and Ether-Channel.
Basic SWITCH and ROUTER configuration, VLAN configuration on GNS3.
• Concepts for IP Addressing, Subnetting, Supernetting, Summarization, Switching, and Routing.
• Basic knowledge of virtualization, VMware, hypervisors, wireless, automation, cloud computing, firewalls, and virtual private networks
(VPN). •Basic understanding of network architecture (3-Tier Architecture, Spine and Leaf 2-Tier Datacenter Architecture, and Software
Define Network (SDN))
2. Linux Skills
• Excellent Linux expertise, including many Linux installation methods.
.
.
• Using RPM and YUM to install and upgrade the OS, the kernel, and other packages
• Management of password policies and user administration.
• Awareness of the shutdown and booting processes.
• Being familiar with setting up various servers (including FTP, WEB, NFS, SAMBA, SMTP, and Autofs).
• Being familiar with SE-LINUX Firewall rule configuration.
• Configuring swap; monitoring server performance and application processes.
• File system management, ACL, and backup tools expertise
• Linux troubleshooting, user and group administration, analysis and correction of login and booting problems.
• Managing the SWAP partition and being familiar with LVM creation.
• Cluster LVM management, File Transfer utilizing (scp, rsync), and Solid Linux Environment Command.
• Quota configuration, IPA server configuration, Cluster server configuration, and VDO device management.
3. Ethical Hacking Skills
• By using Foot-Printing through Search Engines, Vedio Search Engines, IOT Search Engines, Foot-Printing Through Webservices by Using
Netcraft, Peekyou.com, Harvester tool, Sherlock tool, Recon-ng tool, OSINT tool, and Foot-Printing through Email by Using
eMailTrackerPro, I have gained strong knowledge of information gathering.
• Using tools like Nmap, Wireshark, and hping3, I've developed great expertise in network scanning.
• I also gained knowledge of sorts of enumeration, including SMB, NetBIOS, DNS, FTP, and BGP.
• Using the Nikto tool to locate the website's hidden directory gave me a solid understanding of vulnerability assessment.
• Through the use of Metasploit, I have solidified my understanding of Client Side Exploitation and Server Side Exploitation.
• By escalating privileges, stealing credentials, and other methods, I have developed a thorough understanding of privilege escalation.
2. Programming Skills
• I have deep understanding of Syntax and Language Fundamentals ,Data Structures and Algorithms, File Handling and Input/Output
Operations, Python Libraries and Frameworks.
• I have also worked on Database Connectivity, Error Handling and Debugging, Object-Oriented Programming (OOP), Problem-Solving and
Project Development.
CERTIFICATIONS
CCNA- Cisco Certified Network Associate
IIHT
CEH- Certified Ethical Hacking
RST Forum
Information Security Awareness
Fortinet Training Institute
NSE 1 Network Securtiy Associate
Fortinet • 2023
NSE 2 Network Securtiy Associate
Fortinet • 2023
MSCIT
Maharashtra State Board of Technical Education
The Fundamentals of Digital Marketing
Google Digital Garage
DBMS, Python, Django Framework
I.T.Vedant