To seek and maintain full-time position that offers professional challenges utilizing interpersonal skills, excellent time management and problem-solving skills.
1. Project Name: ProInfo
Client: GPL Group Function
Role: Java Analyst
Language: Java 8.0, J2EE (JSP, Servlets)
Technologies: Collections API, JDBC
Frameworks: Spring MVC, Hibernate, Primefaces
Servers: Tomcat
Integration: Databases (Oracle)
Project Details:
This is an online web application, Which provide live data from SAP system and also provide feasibility to write data in SAP through BAPI calls. All procurement user around global in Lanxess use this application for creating shopping cart through catalog and punch out catalog. It also contain contract, purchase order , Freight details modules.
Responsibilities:
Ability to translate customer requirements into implementation plans.
Taking ownership
Strong communication with German team member.
2. Project Name: SME (Lending Automation Platform)
Client: DCB Bank Ltd
Role: Java Analyst
Language: Java 8.0, J2EE (JSP, Servlets)
Technologies: Collections API, JDBC
Frameworks: Spring MVC, Hibernate
Servers: Apache Tomact 9.0.1
Integration: Postgres SQL
Project Details:
Automates the process of Lead capturing, data entry, Customer KYC and other verifications, credit assessment of entity, integration with core banking system for customer and account opening.
Responsibilities:
Involved in full stack development, unit testing and automation test
cases preparation and execution.
Code Development and execute the same.
Involved in end to end modules and bug fixes.
ITIL Foundation:-
ITIL, or Information Technology Infrastructure Library, is a comprehensive framework that helps organizations manage their IT services effectively. ITIL provides a defined approach to IT service management, offering guidelines, best practices, and processes to ensure that IT services align with the needs and goals of the business
CEH - Certified Ethical Hacker :-
The Certified Ethical Hacker (CEH) provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack.
ITIL Foundation:-
ITIL, or Information Technology Infrastructure Library, is a comprehensive framework that helps organizations manage their IT services effectively. ITIL provides a defined approach to IT service management, offering guidelines, best practices, and processes to ensure that IT services align with the needs and goals of the business
CEH - Certified Ethical Hacker :-
The Certified Ethical Hacker (CEH) provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack.