Computer Forensic Examiner Resume
SUMMARY:
- Proficient in computer forensic toolkit (FTK) 5.0 analysis and data recovery.
- Worked on projects using forensic tools like Access data FTK imager 3.1.3.2 and Digital forensic framework (DFF) tool.
- Experienced in projects using freeware JPHS steganography tool to store and retrieve hidden data from a jpeg file.
- Worked on projects using index.dat analyzer tool to introduce the difference between IE Cache and cookies.
- Experienced in using Cisco GNS3 tool (Graphical network simulator) to configured using Linux commands in Linux micro core 3.8.2 Tool and simulate the network topologies.
- Good understanding of network protocols, network devices multiple operating systems and secure architecture.
- Experienced the traffic simulation and packet analysis between networks using Wireshark (64 - bit) 1.6.8 Tool.
- Good Knowledge on understanding of different types of Virtual Machine applications like Oracle VM virtual box, VM ware and Qemu Tools.
- Worked on data modeling concepts (ex. E-R diagrams, Schema, Use Case Diagrams, Activity Diagrams and flow diagrams) for Object oriented and database system development using Argo UML Tool.
- Performed database querying and successfully construct database queries using MySQL.
- Experienced in creating user interface for database car rental system using HTML and PHP.
- Good understanding of how the Constitution, laws, and rulings concerning information management.
- Good knowledge on Fourth amendment, FISA act and USA Patriot Act.
- 3 years of experience in embedded ‘C’ programming and assembly language programming in 8051 microcontroller.
- Ability to work independently, exhibiting sound judgment and discretion
JOB OBJECTIVE:
Searching for company in which to secure a position as Computer Forensic Examiner and to become available asset to company.
PROFESSIONAL EXPERIENCE:
Confidential
Computer Forensic ExaminerTools: Sandboxie tool, GNS3 tool, Oracle VM virtual Box, VM ware, Linux micro core 3.8.2, Qemu and Wireshark 1.6.8
Responsibilities:
- Devised a scenario to place attacker in a sandbox and created the Sandbox environment.
- Created Virtual Private network to show the difference between sandbox and virtual Machine.
Confidential
Computer Forensic ExaminerTools: used: FTK 5.0 Toolkit, Access Data FTK imager 3.1.3.2, DFF tool, freeware JPHS, index.dat analyzer and Access data Registry viewer.
Responsibilities:
- Performed examination on criminal activity.
- Developed and submitted reports on Exfiltration of corporate intellectual property and eavesdropping in M57.biz Company.
- Worked and developed reports through a more realistic case process that involves examining multiple images of m57 patents case.
Confidential
Computer Forensic ExaminerTools: used: GNS3 Graphical network simulator tool, Oracle VM virtual box and Linux micro core 3.8.2 tool and Wireshark 1.6.8.
Responsibilities:
- Described the components and functionality of data and telecommunication networks.
- Described the functionalities of the protocols used in a telecommunication network.
- Compared different network architectures.
- Evaluated network and telecommunication technologies and standards.
- Make technically sound decisions for the deployment of network types (i.e. LAN, WAN, voice) and telecommunication services.
- Described the traffic simulation and packet analysis between networks using Wireshark.
Confidential
Tools: MySQL server, HTML, PHP and Argo UML tool
Responsibilities:
- Developed the E-R Model of the system.
- Developed the schema for your DBMS and Normalize relationships to 3NF.
- Performed queries in MySQL and populated the schema with sample data.
- Created a user interface for the database of car share system.
Confidential
Computer Forensic ExaminerTools: /Software used: Argo UML tool
Responsibilities:
- Developed Use Case Diagrams and prepared the Use Cases scenarios.
- Created Activity diagrams and flow diagrams.
- Prepared Change log and Business rules for the system.
Confidential
Computer Forensic ExaminerResponsibilities:
- analyzed requirements
- Developed hardware.
- Developed code and bug fixing.
Tools: Embedded C and Keil-3 Compiler.
Confidential
Computer Forensic ExaminerResponsibilities:
- Developed necessary drivers, hardware and Bug-fixing
Tools: Embedded C and Keil-3 Compiler.
Confidential
Team member
Responsibilities:
- Developed hardware, coding and Bug-fixing.
Tools: Embedded C and Keil-3 Compiler.
Confidential
Team member
Responsibilities:
- analyzed the requirements, developed hardware, Coding and bug fixing.
Tools: Embedded C and Keil-3 Compiler.