Discussion about building career in data engineering
30 mins
Video Meeting
5
Data Engineering - Resume review
30 mins
Video Meeting
About me
I am a graduate student at Mays Business School and Certified AWS Cloud Practitioner completing my Master's in Management Information Systems. I have worked at Tata Consultancy Services as an SAP Technical consultant in the Manufacturing Industrial Solution Unit on a major Application Development and Maintenance project.
My Technical Competencies are:
Programming - Python, SAP ABAP, SQL, Linux Scripting (Proficient) and Java, R, Scala, NodeJS (Learner)
Cloud Computing Tools - Amazon Web Services (AWS) || EC2, S3, EBS, IAM, VPC, Elastic Load Balancer (ELB), Auto-Scaling, RDS, DynamoDB, RedShift, Kinesis, SageMaker, AWS Cost Management ||
Databases / DBMS - MySQL, MS SQL, MariaDB, MongoDB, Cassandra
Big Data Tools - Apache Spark, SparkSQL, Airflow, PySpark, Hadoop MapReduce, HiveQL, Zepellin, HDFS, Spark Streaming, Apache Kafka
DevOps Tools - GitHub, GitLab, Chef, Puppet, Ansible, Docker Containers, Kubernetes, Openshift, AWS - (CodeBuild, Code Pipeline, Cloud Formation, Elastic BeanStalk)
Visualization Tools - Tableau, Kibana, Python Libraries (Matplotlib, Seaborn, Plotly), R package (ggplot)
Data Structures and Algorithms - Arrays, Linked List, Stacks, Queues, Hash Tables, Binary Trees, AVL Trees, Heaps, Tries, Sorting Algorithms (Bubble Sort, Insertion Sort, Merge Sort, Quick Sort, Counting Sort, Bucket Sort), Search Algorithms (Binary Search, Ternary Search, Exponential Search)
Machine Learning Models - Linear Regression, Logistic Regression, Linear Discriminant Analysis, Classification and Regression Trees, Naive Bayes, K-Nearest Neighbors, Support Vector Machine. Random Forest, XGBoost
IDE and Notebooks - IntelliJ, Visual Studio Code, PyCharm, Jupyter Notebook, Google Colab
Information Security - Qualitative and Quantitative Risk Assessment of IT infrastructure, Audit Security Policies, Penetration Testing and Vulnerability Scanning using Kali Linux, Google Hacking, Port Scanning and Fingerprinting, DES and AES key Encryption, RSA, Diffie Hellman Key Exchange, Firewall and Access Control Management
System Designing Tools and Techniques - Requirement Gathering and Stakeholder Analysis, Data Flow Diagrams, Entity Relationship Diagrams, Unified Modeling Language, User Story, Wireframing, Mockups