Skip to content
- Data Privacy analysis and Data Protection Officer(DPO)
- SIEM Infrastructure and management of SOC
- Ethical Hacking, Red/Blue team activitites
- IT security Analyzes (Threat/Vulnerability/Risk)
- IT Security Architecture and standards
- IT Security Assurance case assessment
- PEN Testing, vulnerability analysis and system hardening
- Domain separation, NTM, VPN, IPSEC, SSL, PKI
- Encryption Algorithms And Security Protocols
- OS / RTOS
- Embedded development Linux for different OS / RTOS in C, C++ and Python
- 3G / 4G R&D
- 3G / 4G Integration & Trouble shooting
- RNC/RBS/ NodeB/MGW User-plane/Control-Plane/Transport-Plane RANAP/RNSAP/RRC/SCTP/NBAP Location Area,UE Security, Paging,Cell-planning, Protocol termination, UE resource management
- Development of event driven/Synchronous systems 1553, CAN, UDP, TCP, IP mm Freescale, ARM, Intel C, C ++, ADA
- Model-based development in executable UML RTOS, Test
- Continous integration Jenkins etc
- Version control CVS, Mercurial, Subversion, GIT
- Methodology SCRUM LEAN KANBAN
- Requirement management in DOORS
- Project management
- SCRUM Master