Saddam Bhesania

Lead, solution architect, and technical consultant in Gurgaon, Haryana, India

Watch my videos

Greetings, As a network and security engineer, I have extensive expertise building, implementing, and maintaining safe and dependable network infrastructures. My expertise in network protocols, security principles, and best practices allows me to effectively defend enterprises from threats and maintain seamless network operations. I have extensive experience configuring and managing network devices, including routers (Cisco, Juniper, HPE, Huawei), switches (Cisco-Nexus, Juniper, HPE, Huawei), firewalls (Checkpoint, Palo alto, FortiGate, Cisco, Juniper, Sophos), load balancers (F5 Big-IQ, F5 Big IP, Radware), F5 WAF and intrusion detection/prevention systems. I've deployed and maintained both wired and wireless networks, guaranteeing optimal performance, scalability, and availability. My expertise includes performing network vulnerability assessments and penetration testing to discover and address potential security flaws. I have a thorough understanding of cryptographic protocols, VPN technologies, and access control methods, allowing me to create strong security measures to protect sensitive data and prevent unauthorized access. My strong problem-solving skills enable me to solve complex network issues and create effective solutions. I am skilled at network monitoring and analysis, using tools and technologies to identify and resolve network performance issues and security breaches. In addition, I am familiar with industry standards and compliance requirements such as PCI DSS, HIPAA, and GDPR. I keep up to speed on the latest breakthroughs in network and security technology, ensuring that I am aware of emerging dangers and can recommend and execute suitable security solutions. Overall, I am a devoted Network and Security Engineer that enjoys designing secure and resilient network designs. I provide a detail oriented approach, strong analytical abilities, and a commitment to producing high-quality solutions that match organizations' specific objectives while assuring the utmost protection of their valuable data.