We provide IT Staff Augmentation Services!

Computer Forensic Examiner Resume

5.00/5 (Submit Your Rating)

SUMMARY:

  • Proficient in computer forensic toolkit (FTK) 5.0 analysis and data recovery.
  • Worked on projects using forensic tools like Access data FTK imager 3.1.3.2 and Digital forensic framework (DFF) tool.
  • Experienced in projects using freeware JPHS steganography tool to store and retrieve hidden data from a jpeg file.
  • Worked on projects using index.dat analyzer tool to introduce the difference between IE Cache and cookies.
  • Experienced in using Cisco GNS3 tool (Graphical network simulator) to configured using Linux commands in Linux micro core 3.8.2 Tool and simulate the network topologies.
  • Good understanding of network protocols, network devices multiple operating systems and secure architecture.
  • Experienced the traffic simulation and packet analysis between networks using Wireshark (64 - bit) 1.6.8 Tool.
  • Good Knowledge on understanding of different types of Virtual Machine applications like Oracle VM virtual box, VM ware and Qemu Tools.
  • Worked on data modeling concepts (ex. E-R diagrams, Schema, Use Case Diagrams, Activity Diagrams and flow diagrams) for Object oriented and database system development using Argo UML Tool.
  • Performed database querying and successfully construct database queries using MySQL.
  • Experienced in creating user interface for database car rental system using HTML and PHP.
  • Good understanding of how the Constitution, laws, and rulings concerning information management.
  • Good knowledge on Fourth amendment, FISA act and USA Patriot Act.
  • 3 years of experience in embedded ‘C’ programming and assembly language programming in 8051 microcontroller.
  • Ability to work independently, exhibiting sound judgment and discretion

JOB OBJECTIVE:

Searching for company in which to secure a position as Computer Forensic Examiner and to become available asset to company.

PROFESSIONAL EXPERIENCE:

Confidential

Computer Forensic Examiner

Tools: Sandboxie tool, GNS3 tool, Oracle VM virtual Box, VM ware, Linux micro core 3.8.2, Qemu and Wireshark 1.6.8

Responsibilities:

  • Devised a scenario to place attacker in a sandbox and created the Sandbox environment.
  • Created Virtual Private network to show the difference between sandbox and virtual Machine.

Confidential

Computer Forensic Examiner

Tools: used: FTK 5.0 Toolkit, Access Data FTK imager 3.1.3.2, DFF tool, freeware JPHS, index.dat analyzer and Access data Registry viewer.

Responsibilities:

  • Performed examination on criminal activity.
  • Developed and submitted reports on Exfiltration of corporate intellectual property and eavesdropping in M57.biz Company.
  • Worked and developed reports through a more realistic case process that involves examining multiple images of m57 patents case.

Confidential

Computer Forensic Examiner

Tools: used: GNS3 Graphical network simulator tool, Oracle VM virtual box and Linux micro core 3.8.2 tool and Wireshark 1.6.8.

Responsibilities:

  • Described the components and functionality of data and telecommunication networks.
  • Described the functionalities of the protocols used in a telecommunication network.
  • Compared different network architectures.
  • Evaluated network and telecommunication technologies and standards.
  • Make technically sound decisions for the deployment of network types (i.e. LAN, WAN, voice) and telecommunication services.
  • Described the traffic simulation and packet analysis between networks using Wireshark.

Confidential

Tools: MySQL server, HTML, PHP and Argo UML tool

Responsibilities:

  • Developed the E-R Model of the system.
  • Developed the schema for your DBMS and Normalize relationships to 3NF.
  • Performed queries in MySQL and populated the schema with sample data.
  • Created a user interface for the database of car share system.

Confidential

Computer Forensic Examiner

Tools: /Software used: Argo UML tool

Responsibilities:

  • Developed Use Case Diagrams and prepared the Use Cases scenarios.
  • Created Activity diagrams and flow diagrams.
  • Prepared Change log and Business rules for the system.

Confidential

Computer Forensic Examiner

Responsibilities:

  • analyzed requirements
  • Developed hardware.
  • Developed code and bug fixing.

Tools: Embedded C and Keil-3 Compiler.

Confidential

Computer Forensic Examiner

Responsibilities:

  • Developed necessary drivers, hardware and Bug-fixing

Tools: Embedded C and Keil-3 Compiler.

Confidential

Team member

Responsibilities:

  • Developed hardware, coding and Bug-fixing.

Tools: Embedded C and Keil-3 Compiler.

Confidential

Team member

Responsibilities:

  • analyzed the requirements, developed hardware, Coding and bug fixing.

Tools: Embedded C and Keil-3 Compiler.

We'd love your feedback!