Highly motivated and detail-oriented Cybersecurity and network security professional having two years experience and a strong foundation in security risk assessments, vulnerability scans, and security awareness training. Skilled in identifying and mitigating potential threats, reducing the risk of successful cyber attacks.Having experience on security tools like monitoring through Firewalls, Wireshark, Nessus Scan. Committed to staying up-to-date with the latest security trends and technologies to ensure the organization is well-equipped to handle emerging threats.
SOFT SKILLS
Awarded by BSNL and AICTE (under EETP programme) on 11-02-2015
Awarded by BSNL and AICTE (Under EETP programme) on 02-12-2014
Awarded by BSNL and AICTE(Under EETP Programme) on 02-01-2014
1) Designing a Cyber Security Program: Risk Assessment, SecOps & Risk Control Mapping with Continuous Monitoring
• Led the design and implementation of a comprehensive security program for Ultra-Enablers INC.
• Conducted risk assessments to identify and evaluate cybersecurity risks within the organization's environment.
• Identified controls and developed detailed implementation plans to mitigate identified risks effectively.
• Evaluated vendors and recommended products/services to enhance cybersecurity measures.
• Designed and implemented monitoring plans, including SIEM integration, 24/7 monitoring, and incident response capabilities.
• Received approval and budget allocation from senior management for project implementation.
• Facilitated the selection and integration of vendor solutions, contributing to improved risk management and security effectiveness.
• Contributed to the development of a robust security program, safeguarding the organization's intellectual property and ensuring privacy compliance.
2) SIEM & SecOps using Wazuh: Enhancing Cyber Security by Detection, Response & Mitigation of Cyber Threats
• Designed and implemented a security monitoring system using Wazuh SIEM for Ultra-Enablers INC.
• Configured Wazuh components to analyse logs from laptops and systems within the network.
• Implemented Wazuh agents on target systems for continuous log monitoring.
• Developed a custom security dashboard for real-time event summaries.
• Generated automated reports to document security posture periodically.
• Conducted analysis of reports to identify security trends and vulnerabilities.
• Implemented file integrity monitoring and vulnerability detection using Wazuh.
• Researched and recommended patches for critical vulnerabilities identified.
• Outcome: Enhanced security posture with an effective monitoring system.
✓ MITRE ATT&CK Framework- In this project, the I analyzed details of threat adversaries and structure the threat information for use in Threat Intelligence For a given APT group I created a defense plan for the target company
✓ Vulnerability Management with Nessus- Installed and configured Nessus Essentials to perform credentialed vulnerability scans against Windows 10 Hosts Conducted vulnerability assessments with Nessus; remediated vulnerabilities
✓ Project on SSL certificate Analysis- Analyzed the SSL certificate of a website to extract details of the certificate fingerprints, validity and certificate levels.
✓ Wireshark Packet Analysis- Inspected the packet capture containing HTTP traffic and identify a 3-way TCP handshake.
✓ Social Engineering Attack Email Analysis- Phishing Email analysis- Analyzed the headers & attachments of a set of emails suspected to be phishing emails.
✓ Ransomware Threat Reports- Performed extensive research on an APT known for conducting Ransomware Attacks.
✓ EDR Product Evaluation- Evaluated the suitability of EDR products on the basis of requirements
✓ Writing Incident Reports- Learnt to write reports on an Incident that are complete and accurate.
✓ Analyzing Windows firewall logs- Performed analysis on log files from a Windows machine.
✓ Port Scanning using NMAP.
✓ Investigating a Compromised Machine
✓ Cracking a Password