5

Data Engineering - 1:1

Discussion about building career in data engineering
Video Meeting
30 mins
Video Meeting
5

Data Engineering - Resume review

Video Meeting
30 mins
Video Meeting

About me

I am a graduate student at Mays Business School and Certified AWS Cloud Practitioner completing my Master's in Management Information Systems. I have worked at Tata Consultancy Services as an SAP Technical consultant in the Manufacturing Industrial Solution Unit on a major Application Development and Maintenance project. My Technical Competencies are: Programming - Python, SAP ABAP, SQL, Linux Scripting (Proficient) and Java, R, Scala, NodeJS (Learner) Cloud Computing Tools - Amazon Web Services (AWS) || EC2, S3, EBS, IAM, VPC, Elastic Load Balancer (ELB), Auto-Scaling, RDS, DynamoDB, RedShift, Kinesis, SageMaker, AWS Cost Management || Databases / DBMS - MySQL, MS SQL, MariaDB, MongoDB, Cassandra Big Data Tools - Apache Spark, SparkSQL, Airflow, PySpark, Hadoop MapReduce, HiveQL, Zepellin, HDFS, Spark Streaming, Apache Kafka DevOps Tools - GitHub, GitLab, Chef, Puppet, Ansible, Docker Containers, Kubernetes, Openshift, AWS - (CodeBuild, Code Pipeline, Cloud Formation, Elastic BeanStalk) Visualization Tools - Tableau, Kibana, Python Libraries (Matplotlib, Seaborn, Plotly), R package (ggplot) Data Structures and Algorithms - Arrays, Linked List, Stacks, Queues, Hash Tables, Binary Trees, AVL Trees, Heaps, Tries, Sorting Algorithms (Bubble Sort, Insertion Sort, Merge Sort, Quick Sort, Counting Sort, Bucket Sort), Search Algorithms (Binary Search, Ternary Search, Exponential Search) Machine Learning Models - Linear Regression, Logistic Regression, Linear Discriminant Analysis, Classification and Regression Trees, Naive Bayes, K-Nearest Neighbors, Support Vector Machine. Random Forest, XGBoost IDE and Notebooks - IntelliJ, Visual Studio Code, PyCharm, Jupyter Notebook, Google Colab Information Security - Qualitative and Quantitative Risk Assessment of IT infrastructure, Audit Security Policies, Penetration Testing and Vulnerability Scanning using Kali Linux, Google Hacking, Port Scanning and Fingerprinting, DES and AES key Encryption, RSA, Diffie Hellman Key Exchange, Firewall and Access Control Management System Designing Tools and Techniques - Requirement Gathering and Stakeholder Analysis, Data Flow Diagrams, Entity Relationship Diagrams, Unified Modeling Language, User Story, Wireframing, Mockups