Hi kumar, and welcome.
In addition to the aforementioned thoughts, how is your background with 'Object oriented' languages like Ruby and Python? If you've got even a decent background in C++, and as Ketchup noted, you understand memory and such, you'd likely be able to pick up on the other languages pretty easily, and Ruby and Python are very heavily utilized in many of the tools and exploit development projects (CANVAS, CoreImpact, Metasploit, etc.) Granted, the object oriented side of them is different than C++, but the concepts are easily understood, and I'm sure you could quickly adapt.
Assuming you could pick them up fairly easily, you could really go far on the exploit end of the security spectrum, but even if you don't, the understanding you've gained as a programmer will help you to know what types of things you can be looking for, and you'll better understand, at least, what exploits are doing under the hood, giving you an advantage over many of the 'script-kiddie' types that both attack systems (unethically,) as well as quite a few who are looking to get into the proactive side of security (ethically.)
As far as the security knowledge / experience requirements for CEH, I'd agree, that you could work on something like Sec+, etc, or you could even do some co-op work with existing companies, directly assisting or developing security offerings, to begin getting that time in. Either way, from my experiences with other folks who needed to meet the requirements (I met mine, prior to even reviewing the course, so I haven't personally had to consider alternate options,) I know EC-Council has been pretty reasonable, provided the experience you have in IT and programming is documented and verifiable, and you can show you're working towards direct activity in security.
Good luck, and if you do approach them, let us know how they respond. It's always nice to get feedback that we can give to others, who are in the same types of situations.
~ hayabusa ~
"All men can see these tactics whereby I conquer,
but what none can see is the strategy out of which victory is evolved."
- Sun Tzu, 'The Art of War'
OSCE, OSCP (Former - GPEN, C|EH - both expiring / expired)