“I had the pleasure of working closely with Krutik as a director of his team during his tenure at NEC. He demonstrated exceptional expertise in cybersecurity, having successfully built our security function from the ground up. Krutik played a pivotal role in our organization by establishing robust security frameworks and protocols. He possessed deep knowledge in cyber threat analysis, vulnerability management, and incident response, which significantly strengthened our defenses against evolving threats. He showed exemplary execution skills, effectively translated cybersecurity strategies into actionable plans and initiatives. Krutik had a keen ability to prioritize and address critical security concerns, ensuring the integrity and confidentiality of our systems and data. Moreover, Krutik demonstrated strong leadership in managing cybersecurity within our software development lifecycle. He championed the integration of security processes seamlessly into our agile development practices, fostering a culture of security awareness and proactive risk mitigation across teams. His collaborative approach was instrumental in fostering positive relationships with development teams and other cross-functional stakeholders. Krutik effectively communicated complex security concepts and requirements, aligning them with business objectives and ensuring compliance with industry standards. Overall, Krutik was an invaluable asset to our organization, consistently delivered exceptional results, and drove continuous improvement in our cybersecurity posture. I wholeheartedly recommend him for his next challenge in the field of cybersecurity, where his skills and leadership undoubtedly made a significant impact.”
工作经历和教育背景
资格认证
志愿者经历
课程
-
Algorithm concepts
A
-
Artificial Intelligence
CSCI 755
-
Cryptography
INCS 741
-
Intrusion detection and hacker exploits
INCS 745
-
Network security and perimeter protection
INCS_615
-
Operating system security
A
-
Security risk analysis (Management)
MGMT 755
-
THESIS 1
-
-
THESIS 2
-
-
Topics in computer security
INCS 810
所做项目
-
Privacy Preserving Yao’s Garbled Circuit Protocol Improvement
-
-Two party secure communication protocol
-Improvement in the communication protocol by 83% on average
-Tools used for developing Eclipse, xcode
-Language used java (Apache ant) -
Research on Continuous Authentication in Mobile Device
-
-Project on continuous authentication based on user behavior on mobile device
-Developed a module in iOS to measure the distance between phone and face
-Use of xcode and ARKit to develop the module
-Language used Swift 3 -
Classify discrete-valued data instances using na?ve Bayes (NB) and tree augmented na?ve Bayes (TAN)
-
We were required to use two classifiers based on the Bayes classification rule: (1) na?ve Bayes (NB) and (2) tree augmented na?ve Bayes (TAN), to classify discrete-valued data instances. WEKA software was used to perform classification on the data.
荣誉奖项
-
Award for Demonstrated Excellence
Upsilon Pi Epsilon Honor society
-
Faculty Award for Demonstrated Excellence
New York Institute of Technology
收到的推荐信
-
领英用户
5 位会员推荐了Krutik
加入领英,即可查看