Statement of Purpose

Only available on StudyMode
  • Download(s) : 32
  • Published : January 5, 2013
Open Document
Text Preview
P.SRI KUMAR H.No: 27-16/15/D, KRUPA COMPLEX, SAFILGUDA, SECUNDERABAD. Pin no:500056 CAREER OBJECTIVE:  To be an integral part of a competitive organization with sample growth

EMAIL ID: kumarsri310@gmail.com MOBILE NO: 07702526300

opportunities.
 To enhance my skills in various fields in an environment that poses day-to-day challenge.  A responsible and challenging career where I can utilize my education and skills for the

organization and personal growth.
To work in a challenging and dynamic environment, to keep adding value to myself and

simultaneously contribute to the growth and success of the organization. EDUCATIONAL QUALIFICATION:

Course Btech(CSIT)

Institution GURU NANAK INSTITUTE OF TECHNOLOGY,IBRAHIMPATNAM

Year of passing 2012

Percentage 67.78%

Intermediate(MPC) SRI CHAITANYA JR COLLEGE SSC(STATE) NALANDA HIGH SCHOOL

2008 2006

65% 71.3%

TECHNICAL SKILLS: Operating Systems Packages Languages ACHIEVEMENTS:  Won bronze medal in Taekwondo Federation in india its an Indian Olympic Association. : : : Windows 2000/XP/2007 MS Word, MS Excel and MS Power Point C ,core JAVA,adv JAVA,J2EE,SQL.

EXTRA-CURRICULAR ACTIVITIES:  Sharing knowledge is a divine act. I have taken it up on myself to educate needy children. This includes even conducting summer camps for kids. PROJECT PROFILE: WEB APPLICATION SECURITY SCANNER:A web application security scanner is program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses. It performs a black-box test. Unlike source code scanners, web application scanners don't have access to the source code and therefore detect vulnerabilities by actually performing attacks. A web application security scanner can facilitate the automated review of a web application with the expressed purpose of discovering security vulnerabilities, and are required...
tracking img