Search

Gautam Punukollu Phones & Addresses

  • 30 W 18Th St APT 12B, New York, NY 10011
  • Greensburg, PA

Work

Company: Blackrock Jan 2012 to Oct 2015 Position: Associate - portfolio management tools

Education

Degree: Bachelors, Bachelor of Arts School / High School: Columbia University In the City of New York 2005 to 2009 Specialities: Economics

Skills

Project Management • Business Analysis • Analytics • Sdlc • Sql • Perl • Unix Shell Scripting • Blackrock Aladdin • Web Development • Data Science • Data Analysis • Python • Pyspark • Big Data Analytics

Industries

Financial Services

Resumes

Resumes

Gautam Punukollu Photo 1

Deployment Strategist At Palantir Technologies

View page
Location:
100 Hamilton Ave, Palo Alto, CA 94301
Industry:
Financial Services
Work:
Blackrock Jan 2012 - Oct 2015
Associate - Portfolio Management Tools

Palantir Technologies Jan 2012 - Oct 2015
Deployment Strategist at Palantir Technologies

Blackrock Sep 2009 - Dec 2011
Analyst - Aladdin Product Group

Credit Suisse Jun 2008 - Aug 2008
Intern - Advanced Execution Services and Program Trading

Lehman Brothers Sep 2007 - Dec 2007
Intern - Equity Technology
Education:
Columbia University In the City of New York 2005 - 2009
Bachelors, Bachelor of Arts, Economics
Skills:
Project Management
Business Analysis
Analytics
Sdlc
Sql
Perl
Unix Shell Scripting
Blackrock Aladdin
Web Development
Data Science
Data Analysis
Python
Pyspark
Big Data Analytics

Business Records

Name / Title
Company / Classification
Phones & Addresses
Gautam Punukollu
Manager
Gpnp Holdings, LLC
159 Saint Ives Dr, Greensburg, PA 15601

Publications

Us Patents

Detection Of Vulnerabilities In A Computer Network

View page
US Patent:
20220321595, Oct 6, 2022
Filed:
Jun 21, 2022
Appl. No.:
17/845514
Inventors:
- Denver CO, US
Abhishek Agarwal - Jaipur, IN
Andrew Eggleton - Doha, QA
Brandon Helms - Arnold MD, US
Carl Ambroselli - Potsdam, DE
Cem Zorlular - New York NY, US
Daniel Kelly - New York NY, US
Gautam Punukollu - New York NY, US
Jeffrey Tsui - Palo Alto CA, US
Morten Kromann - Kobenhavn, DK
Nikhil Seetharaman - Palo Alto CA, US
Raj Krishnan - Mumbai, IN
Samuel Jones - Chelmsford MA, US
Tareq Alkhatib - Richmond, CA
Dayang Shi - New York NY, US
International Classification:
H04L 9/40
G06F 8/65
H04L 67/75
Abstract:
A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.

System Event Detection System And Method

View page
US Patent:
20210026952, Jan 28, 2021
Filed:
Aug 23, 2019
Appl. No.:
16/549261
Inventors:
- Palo Alto CA, US
Elliot Colquhoun - Auckland, NZ
Ranec Highet - London, GB
Xiao Tang - Singapore, SG
Tareq Alkhatib - Richmond, CA
Raj Krishnan - Doha, QA
Nick Seetharaman - Sydney, AU
Brandon Helms - Washington DC, US
Daniel Kelly - New York NY, US
Gautam Punukollu - New York NY, US
Morten Kromann - Doha, QA
International Classification:
G06F 21/55
G06F 21/57
Abstract:
A method, performed by one or more processors, including receiving a plurality of system event records; processing the plurality of system event records using a set of event detectors to determine that a suspicious system event has occurred; sending, to a client device, a plurality of properties associated with the suspicious system event; receiving, from the client device, a selection indicator indicating a selected one or more properties of the plurality of properties; generating one or more new event detectors based on the selected one or more properties; and adding the one or more new event detectors to the set of event detectors.

Context-Aware Network-Based Malicious Activity Warning Systems

View page
US Patent:
20200322365, Oct 8, 2020
Filed:
Jun 18, 2020
Appl. No.:
16/904944
Inventors:
- Palo Alto CA, US
Asavari Sinha - New York NY, US
Gautam Punukollu - New York NY, US
Kyle McLain - Royal Oak MI, US
Vivian Yu - Seattle WA, US
International Classification:
H04L 29/06
Abstract:
A computer system is configured to generate alerts related to malicious activity on an audited computing system. The computing system is provided with instructions to receive activity information associated with activity of an entity performed in an audited computing network, access contextual information associated with the entity, determine, based on the contextual information, a set of weights associated with the activity information and combine the weight and the entity activity information to generate a risk score. In response to the risk score satisfying a threshold value, the computer system may generate an alert, and, in response to receiving a user input associated with the alert, update the set of weights. In certain embodiments, the updated weights may be used for determining the risk score of future alerts.

Detection Of Vulnerabilities In A Computer Network

View page
US Patent:
20200204578, Jun 25, 2020
Filed:
Mar 6, 2019
Appl. No.:
16/293690
Inventors:
- Palo Alto CA, US
Abhishek Agarwal - Jaipur, IN
Andrew Eggleton - Doha, QA
Brandon Helms - Arnold MD, US
Carl Ambroselli - Potsdam, DE
Cem Zorlular - New York NY, US
Daniel Kelly - New York NY, US
Gautam Punukollu - New York NY, US
Jeffrey Tsui - Palo Alto CA, US
Morten Kromann - Kobenhavn, DK
Nikhil Seetharaman - Palo Alto CA, US
Raj Krishnan - Mumbai, IN
Samuel Jones - Chelmsford MA, US
Tareq Alkhatib - Richmond, CA
Dayang Shi - New York NY, US
International Classification:
H04L 29/06
H04L 29/08
G06F 8/65
Abstract:
A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.

Data Item Aggregate Probability Analysis System

View page
US Patent:
20180173814, Jun 21, 2018
Filed:
Dec 28, 2017
Appl. No.:
15/856586
Inventors:
- Palo Alto CA, US
Duncan Hoffman - New York NY, US
Salar al Khafaji - Amsterdam, NL
Jakub Kowalik - Lombard, IN
Pedro Sanzovo - New York NY, US
Gautam Punukollu - New York NY, US
International Classification:
G06F 17/30
G06N 7/00
G06F 3/0484
G06T 11/20
Abstract:
Computer-implemented systems and methods are disclosed for automatically aggregating, analyzing, and presenting probabilities associated with data items. Data items may be associated with probabilities or risks, and the data items may have various characteristics. A grouping of data items may be determined based on these characteristics, and probabilities within groups of data items may be aggregated and analyzed. Aggregated probabilities may be used to determine incremental probabilities for individual data items, to assess cumulative risk associated with a group of data items, and to analyze probabilities associated with a particular data item group. User interfaces may be generated to facilitate selection and grouping of data items, selection of risk models, and analysis of aggregate probabilities.
Gautam Punukollu from New York, NY, age ~38 Get Report