Candidates
Employers
Login
Sign Up
Likhitha
Chandolu
Location
Utica, NY
Education
S
SUNY Polytechnic Institute
August 2022 - April 2024
degree
Master's
major
Computer Networking and Telecommunications
Work Experience
E
Eversource Energy
Senior Network Security Engineer
March 2024 - present
company
Eversource Energy
title
Senior Network Security Engineer
P
Providence Health
Lead IT Network Security
January 2023 - February 2024
V
Vsion Technologies
Security Solutions Engineer
October 2021 - November 2022
C
Cognizant Technologies
Network Engineer
June 2019 - August 2021
Skills
24/7 Services
Access Controls
Accounting Methods
Active Directory
Adaptability
Administrative Operations
Advanced Cardiovascular Life Support (ACLS)
Algorithms
Amazon Virtual Private Cloud (VPC)
Amazon Web Services
Ansible
Application Data
Application Layers
Application Performance Management
Application Programming Interfaces (APIs)
Architecture
ARM Architecture
Asset Tracking
Atomic Force Microscopy
Auditing Skills
Automation
Big Data
Big Ip
Border Gateway Protocol
Business Efficiency
Business Priorities
Business Process Improvement
Business Requirements
Carrying out Assessments
Catalyst (Software)
Certification in Control Self-Assessment
Certified Ethical Hacker
Check Point Firewalls
Cisco
Cisco Certified Network Associate
Cisco Certified Network Professional
Cisco Firewalls
Cisco Nexus Switches
Cisco PIX
Cisco Routers
Cisco Systems VPN Client
Cisco Unified Communications Manager
Cloud Computing
Cloud Computing Security
Communication Skills
Complex Networks
Computer Networks
Computer Security
Configuration Management
Content Management
Continuous Monitoring
Control Networks
Cryptography
Customer Account Management
Customer Service
Cybercrime
Dashboards
Database Models
Database Replication
Databases
Data Center Networking
Data Centers
Data Distribution Service
Data Integrity
Data Processing
Data Recovery
Data Security
Data Streaming
Data Transmissions
Differentiated Services
Disaster Recovery
Docker
Domain Name System (DNS)
Dynamic Host Configuration Protocol
Dynamic Routing
Electrical Switches
Electronic Medical Records
Email Filtering
Enhanced Interior Gateway Routing Protocol
Ethernet
Event Logging
Event Monitoring
Fault Tolerance
Firepower
Firewalls (Computer Science)
Firmware
Forecasting Skills
Fortinet
Frame Relay
Friendliness
Gigabit Ethernet
Google Cloud
H.323 Protocol
Health Insurance Portability and Accountability Act Compliance
Help Desk
Hot Standby Router Protocol
Hunting
Hyper-V
Identity and Access Management
Impact Analysis
Incident Management
Incident Response
Information Assurance
Information Technology
Infrastructure Management
Internet Control Message Protocol
Internet Protocol Security (IP SEC)
Intrusion Detection Systems
IPv4
IT General Controls (ITGC)
Juniper
Kubernetes
Language Translation
Leadership
Lifecycle Management
Linux
Load Balancing
Long-Term Memory
Low Latency
Management of Changes
Management of Stress
Management Processes
Manual Testing
Media Gateway Control Protocol (MGCP)
Medical Surveillance
Mentoring
Metrics
Microservices
Microsoft Azure
Microsoft Teams
Microsoft Visio
Mobile Device Management
Monitoring of Systems
Multi-Factor Authentication
Multi-protocol Systems
MySQL
National Institute of Standards and Technology
NetFlow
Network Address Translation
Network Administration
Network Architecture
Network Engineering
Networking Hardware
Networking Skills
Network Layer
Network Performance
Network Planning and Design
Network Security
Network Server
Network Service
Network Topologies
Nginx
Open Shortest Path First
Open Source Technology
Operations Security
Organization Development
Packet Analyzer
Palo Alto Networks
PCI Data Security Standards
Performance Management
Performance Monitor
Performance Testing
Performance Tuning
Perseverance
Phishing
Policy Development
Policy Enforcement
PostgreSQL
Prioritization of Requirements
Problem Solving
Proprietary Software
Public Cloud Computing Platform
Public Key Certificates
Public Key Infrastructure
Puppet
Python (Programming Language)
Real Time Data
Regulatory Compliance
Relational Databases
Remote Access Technology
Research Skills
Restful APIs
Risk Analysis
Road Traffic Controls
Role-Based Access Control
Root Cause Analysis
Route53
Routing
Safety Principles
Sarbanes-Oxley Act (SOX) Compliance
Scalability
Security Administration
Security Audits
Security Controls
Security Devices
Security Engineering
Security Information and Event Management
Security Managing
Security Policies
Security Systems
Self Motivation
Service Delivery
Service-Level Agreement
Servicenow
Service Quality
Session Management
Signalling Connection Control Part (SCCP)
Simple Network Management Protocols
Simulations
Single Sign-On
Site Survey
Software Debugging
Software Deployment
Software Engineering
Software System Penetration Testing
Software Tools
Software Vulnerability Management
SolarWinds (Software)
Sonicwall
Spectral Analysis
Splunk
SQLite
Standardization
Strategic Thinking
Success Driven Person
Swap (finance)
Syslog
System Availability
TCP/IP
Team Working
Technical Skills
Telemetry
Telephone Skills
Terminal Access Controller Access-Control System (TACACS)
Terraform
Testing Skills
Test Scripts
Textiles
Topology
Traffic Flow
Traffic Patterns
Transmission Control Protocol (TCP)
Transport Engineering
Transport Layer
Transport Layer Security
Tunnels
Unix Shell
Unloading Skills
Virtualization Technology
Virtual Local Area Networks
Virtual Machines
Virtual Private Networks (VPN)
Virtual Router Redundancy Protocols
VLAN Trunking Protocol (VTP)
Vmware
VMware VSphere
VoIP
Vulnerability
Vulnerability Analysis
WAN Optimization
Web Performance Optimization
Wide Area Networks
Wireless Communications
Wireless LAN
Wireshark
YAML