
This is software (AWS) generated transcription and it is not perfect.
he started my career in 2011. Ah, initially when I came into I t I did not have much addressed, to be honest, but I was just running the rat race that everyone wants to be a nightie and then the same way I came into i t. But ah, but yeah, after started working initially I was I was just planning to be a developer, developer, and always I would do Java and all this kind of stuff. But then when I actually got my first job, I started my career with IBM. My first job was as a system administrator. That's then I started to learn more off. I d not just development. I've had more experience with Lennox UNIX sand networks. So that's what's something that I really enjoyed on. So from there I started toe get digging to more, and from there I started networks and then slowly ah, and gradually I moved to a system administrator and all those basic steps that one takes to its here. So I was working in open systems and when I started working in networks, I got interested in 90 security and security analysis. And because networks is basically very important for it. And then I started, um, just having interest in it. And then I was given an opportunity to go onshore and work for one of the banking customers in Amsterdam. And there I was like, Oh, I want to go for the scarier. I love I d Security. And that's when I decided that Oh, I will come from about my masters to the U. S. Because and when I was selecting the colleges, it was basically that U S is the best. I want to go to the U. S. Because they're the best colleges there. And it it's it's not pretty easy. You have to give Jerry and it's ah, I will not say it's like a very easy test. It's actually based on your actual aptitude, to be honest. So that's how I decided to pursue masters. And then I wanted to be an animus. So I took an analyst course here. I started with information systems, and I took subjects like information, security and on networks and silvers. And that's how I landed up in an internship here as a cyber security analyst. And since then it has just been a growth for me. And I've learned a lot. That's how where I am today, I have worked with three companies here. Intermountain Healthcare. Then I worked with semantic, then Broadcom, acquired by Broadcom, And I'm working with the bank. Ah, and its I'm working as a security on list. I'm a senior security Aniston strike now. So this is what my career but has bean. So ah, lot of people go into development. I like quoting. It's not that I hate quoting because it's a very important part. When I do pen testing and different stuffs, I do you scolding. But I want to be in this country and this is what I like, Yeah.
Corman's semantic. I was working as a technical account manager, basically ah, secularity products that semantic used to offer a now required by Broadcom's they these products, about by different big big companies and small companies, all all over. So these companies have their security infrastructure build, and I was responsible basically to deal with all the infrastructures security Ah, stuff that was related to their organization. Basically, they will come to us and they will say, Hey, we want to use maybe an anti virus. Maybe we want to use some some soft endpoint protection. Ah, productive for our environment. So we were the person we would understand what their need waas and then based on that, we would suggest Okay, this is what you can go for based on your environment and then we will help them implement all the security solutions in their environment, help them. I understand what is important basically all in all related to the environment. So if I just put it in one sentence, it would be like if you buy something from semantic, I would be the face of semantic for all the technical solutions for youGenerally the work is 40 hours a week, but ah, since I am into security and if there is anything that is off hours that need to be done or farmers, I have to be on call. So, um, if you have a bigger team, then you might end up doing like a non call, like maybe three once and three months or once in four months. But if you have a smaller team than you would have to have weekly Ah, maybe one day a week you will have to work on the weekend, and then you will get a comp off on the weekday or you will work in like every month. You will have, like, two week weekends, that you will be working and then you will get a comp. Oh, for depending on that. So my job definitely is not 40 hours and 9 to 5. It has to go beyond that. Yeah,
so security has a step. It has a step in all the parts of the infrastructure. So when it comes to monitoring, I have you stools like wire shark. I have used Maggio's and different on that category when it comes to penetration, testing or when it comes to ah, normal debugging. I have used tools like burb Suit Next, the scanner off course, and in that category, what the baseline is. I have used multiple tools, and there are a lot available in the market what really is required. You need to have knowledge of networks because the tool can give you an output. Oh, this is wrong. Suppose there is a port that is not not the old. The sport is open, but I need to have my understanding of what does the sport open means. So if you have the basic knowledge, I don't think any any tool. It's hard or difficult to learn, so I variably do not. I'm not tool dependent. I'm just dependent on my skills and what I know