Manoj Makhija

Manoj Makhija

New York City Metropolitan Area
4K followers 500+ connections

About

A Cyber security professional with experience in implementing Identity and Access…

Articles by Manoj

See all articles

Activity

Join now to see all activity

Experience

  • PwC Graphic

    PwC

    New York City Metropolitan Area

  • -

    New York City Metropolitan Area

  • -

    New York City Metropolitan Area

  • -

    Greater New York City Area

  • -

    Buffalo/Niagara, New York Area

  • -

    Bengaluru Area, India

  • -

    Gurgaon, India

Education

  • University at Buffalo Graphic

    University at Buffalo

    -

    Activities and Societies: President, University at Buffalo ISACA Student Group Graduate Students Committee Member, Management Information Systems Association (MISA)

    Spring 2018 Courses:

    MGS 610: Digital Forensics
    MGS 614: Systems Analysis and Design
    MGS 616: Predictive Analytics
    MGS 625: Management of IT Projects
    MGG 503: Introduction to Business
    MGS 649: MS Practicum with GlobalSecurityIQ as a Cybersecurity Intern
    MGS 647: Supervised Research with Dr. Gupta on the evolution of HITRUST Common Security Framework

    Fall 2017 Courses:

    MGS 642: Information Systems Audit for IT Managers (Aligned with CISA)
    MGS 650:…

    Spring 2018 Courses:

    MGS 610: Digital Forensics
    MGS 614: Systems Analysis and Design
    MGS 616: Predictive Analytics
    MGS 625: Management of IT Projects
    MGG 503: Introduction to Business
    MGS 649: MS Practicum with GlobalSecurityIQ as a Cybersecurity Intern
    MGS 647: Supervised Research with Dr. Gupta on the evolution of HITRUST Common Security Framework

    Fall 2017 Courses:

    MGS 642: Information Systems Audit for IT Managers (Aligned with CISA)
    MGS 650: Information Assurance
    MGS 640: IT Risk (Aligned with CRISC)
    MGS 655: Distributed Computing and Big Data
    MGS 613: Database Management Systems
    MGQ 606: Statistical Analytics
    MGS 607: Technology and Innovation Management

  • -

    Activities and Societies: IEEE, Image Processing, Research Paper Presentation, Website Development, Content Writing

    Completed Bachelor of Technology in Electronics and Communications Engineering from JIIT, Noida. Earned a total of 195 credits.

Licenses & Certifications

Volunteer Experience

  • President

    UB ISACA Student Group (ISG)

    - 8 months

    Education

    The UB ISG is a student group, the purpose of which is, through student empowerment, to expand recognition of the IT Audit and Assurance, Security and IT Governance disciplines, by extending education beyond the classroom on standards, practices, and certification. More specifically, the objectives of the ISG are:
    • To promote the education of and help expand the knowledge and skills of its members in the interrelated fields of IT governance, IS audit, security, control, and assurance;
    •…

    The UB ISG is a student group, the purpose of which is, through student empowerment, to expand recognition of the IT Audit and Assurance, Security and IT Governance disciplines, by extending education beyond the classroom on standards, practices, and certification. More specifically, the objectives of the ISG are:
    • To promote the education of and help expand the knowledge and skills of its members in the interrelated fields of IT governance, IS audit, security, control, and assurance;
    • To encourage a free exchange of IT governance, IS audit, security, control and assurance techniques, approaches, and problem-solving by its members;
    • To promote adequate communication to keep members abreast of current events in IT governance, IS audit, security, control and assurance that can be beneficial to them and their employers;
    • To communicate to management, auditors, universities and to IS professionals the importance of establishing controls necessary to ensure proper IT governance and the effective organization and utilization of IT resources; and
    • To promote the Association’s professional certifications and IT governance

  • Member, Graduate Committee

    Management Information Systems Association (MISA) at UB

    - 5 months

  • AIESEC Graphic

    Manager

    AIESEC

    - 7 months

    • Worked as a team member and then as a manager in Information Management Department of AIESEC in Delhi IIT.
    • Managed a team of 10 for preparing Business Intelligence reports and web designing.

  • Grand Prix Events Graphic

    Volunteer

    Grand Prix Events

    - 1 year

    • Volunteered at the Indian Grand Prix in 2012 and 2013.

  • Editor, PR, Writer

    The Indian Fusion

    - 2 years

    • Worked as an author and then as the Managing editor of the website. Also worked in the PR team.

Publications

  • Detecting the Number of fingers raised and performing real time applications

    ISSPIT IEEE

    To make the algorithm work with real time applications, we used the concept of mask subtraction. Improved results and more number of functions were now achieved.

    Other authors
    See publication
  • Computer Application Control by Hand Gesture Recognition

    International Journal of Electronics, Communication and Instrumentation Engineering Research and Development of TJPRC

    Used a totally new algorithm to improve our previous results.

    Other authors
    See publication
  • Control Windows Photo Viewer by Hand Gesture Recognition


    International Journal of Advance Engineering and Research Development

    This paper works on controlling different functions of the image viewer through hand gesture recognition. In this paper a simple yet effective approach has been used to zoom in, zoom out and to view different images in an image viewer. Thumb plays an important role in the algorithm and the gestures used makes sense with the functions that these gestures are doing in the image viewer. This paper used a 30 fps with up to 30 mega pixel camera. Furthermore, pre-processing is done to segment the…

    This paper works on controlling different functions of the image viewer through hand gesture recognition. In this paper a simple yet effective approach has been used to zoom in, zoom out and to view different images in an image viewer. Thumb plays an important role in the algorithm and the gestures used makes sense with the functions that these gestures are doing in the image viewer. This paper used a 30 fps with up to 30 mega pixel camera. Furthermore, pre-processing is done to segment the hand region from its background. The proposed algorithm can be used for controlling different applications as well.

    Other authors
    See publication
  • Switching Application Using Hand Gesture Recognition

    National Conference on Emerging Trends in Computer & Electrical Engineering

    Initiating and closing of simple computer applications using hand gesture recognition. This paper implied a simple algorithm with 100% efficiency. The paper was presented and published in ETCEE 2014 organised by Gujrat Technical University and Computers society of India.

    Other authors

Courses

  • AWS: Overview of AWS Identity & Access Management (IAM)

    -

  • IdentityNow Introduction

    -

Projects

  • Risk Management in Healthcare Environment Using HITRUST CSF

    -

    Healthcare has proven itself to be a lucrative target for hackers. Healthcare Information Systems has always been more vulnerable to malfunctioning or identity theft than any other systems. In 2013, Department of Homeland security checked 300 medical devices and all of them failed security checks . There should be stringent controls in place to curtail the risk associated to Protected Health Information (PHI). To deal with this, HI-TRUST Common Security Framework is increasingly being seen as…

    Healthcare has proven itself to be a lucrative target for hackers. Healthcare Information Systems has always been more vulnerable to malfunctioning or identity theft than any other systems. In 2013, Department of Homeland security checked 300 medical devices and all of them failed security checks . There should be stringent controls in place to curtail the risk associated to Protected Health Information (PHI). To deal with this, HI-TRUST Common Security Framework is increasingly being seen as the solution to this problem, it enforces companies to meet privacy and security standards in order to mitigate risk and protect health information. HI-TRUST CSF is now widely being used to correctly implement the security of a healthcare organization . HI TRUST, the parent body that publishes HI-TRUST Common Security Framework claims that the framework works on the 5 steps for Risk Management in any organization. In this paper, we will map HI TRUST Common Security Framework’s controls with COBIT 5’s controls and then with the 5 steps of risk management, to check whether or not HI-TRUST’s claim of HI-TRUST CSF following a risk management approach at the high level is correct or not.

  • Federated Authentication and Authorization Services (FAAS)

    -

    Provided Federated authentication and authorization services to one of Wipro's biggest clients: Shell.

    Other creators
  • Managing Leased Line Connections for Airtel

    -

    Worked as a Network Engineer for managing leased line connections for Airtel's corporate clients.

    Other creators
  • Academic Projects at JIIT

    -

    Controlling music player using Hand Gesture Control- Created a music player controlled by different hand gestures using MATLAB. Received an A+.
    Controlling image viewer using hand gestures- Created an Image viewer controlled by different hand gestures using MATLAB.
    Classification and segmentation of medical images- Worked on extracting important information out of medical images like identifying fractured bone from X-Ray images. Also worked on classification of Images for CBIR using…

    Controlling music player using Hand Gesture Control- Created a music player controlled by different hand gestures using MATLAB. Received an A+.
    Controlling image viewer using hand gestures- Created an Image viewer controlled by different hand gestures using MATLAB.
    Classification and segmentation of medical images- Worked on extracting important information out of medical images like identifying fractured bone from X-Ray images. Also worked on classification of Images for CBIR using machine learning. Received an A+.

    Other creators

Honors & Awards

  • Dean's Excellence Scholarship

    Jindal School of Management, University of Texas at Dallas

    Jindal School of Management at University of Texas Dallas offered Dean's Excellence Scholarship for MS in Information Technology Management for Fall 2017.

  • Trailblazer-Best Performer

    Wipro

    Wipro's 'Trailblazer- Best performer in the account', awarded to best performers for the quarter in band B1 and above.

  • 1st Rank in Managed Security Solutions Training

    Wipro

    Secured 1st rank in Managed Security Solutions Training for freshers joining Wipro Limited.

  • Academic Excellence Award

    Kulachi Hansraj Model School

    Highest marks in Physics. Good overall performance.

  • Academic Excellence Award

    -

    Good Academic Performance in SSC Examination.

Test Scores

  • Certified Information Systems Auditor (CISA)

    Score: 678

Languages

  • English

    Full professional proficiency

  • Hindi

    Native or bilingual proficiency

Organizations

  • ISACA

    -

    - Present

Recommendations received

More activity by Manoj

View Manoj’s full profile

  • See who you know in common
  • Get introduced
  • Contact Manoj directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Manoj Makhija

Add new skills with these courses