Python
Organized and dependable candidate successful at managing multiple priorities with a positive attitude. Willingness to take on added responsibilities to meet team goals. Analytical Information Security Engineer with 5 years of experience managing security operations across sites . Proven expertise in cybersecurity tools, including CyberArk and Beyond trust EPM tools. Interested in shifting career to IT Security System industry.
Policies and procedures
undefinedCyber-Security SKILL(S):kali linux, linux,Power Shell Scripting, Linux Shell Scripting, Python Scripting, Cloud Security, Reconnaissance –
Information harvesting and intelligence, rapid7 metasploit, Remote access trojans (RATs) ,weaponization tactics Art of Scanning, Enumerating services, Exploiting – payload delivery and exploit,Gaining Foothold – installation, Persistence Remote, C&C – Command and Control, Cover tracks and forensic evidence, DMZ and Perimeter Security,Network Access Controls, Endpoint Security, Patch Management, Security Baseline, Web Application Security Basic working of Web and Browser, Burp suite, Common Application Level attacks, OWASP Top 10 , Android Penetration Testing OWASP top 10 for Mobiles, SIEM, SOC, NextGen SOC, SOC & SIEM Architecture and Deployment Logs,Events Collection and Event Correlation Developing,associated correlation rules, Detection and Prevention Incident Management, Logs Setting up Sysmon, Threat Hunting on Windows Processing Logs via ELK and Making Visualizations Red & Blue teaming engagements Aligning cyber-security with business strategies, aligning roles and responsibilities for cyber-security Employee, Awareness Development Threat Intelligence, conducting business impact analysis for cyber threats, Developing reports and presentations for the non-technical business, Industrial Control Systems Controllers and Measuring devices Programmable Logic Controllers, Distributed Control Systems and SCADA Typical ICS Architecture Impact of ICS failure Attack, stories Operational Challenges Related Cyber Security Challenges, IT and OT systems Securing ICS Proactive Security Model ICS defense - IN- Depth Strategies, ICS Risk Management and Assessment Applying Security Controls, ISO 27001 and NIST 800, Governance, Operations, and Assurance,Block chain as a tool for cyber-security , Block-chain for IoT security, Artificial Intelligence and Machine Learning for Cyber-security.
IT Operation SKILL(S)
Business as Usual: - Managing KPI, and SLA’s,Escalation Handling, skills interview evaluation,Training and knowledge transfer, Process Management,Project management, ITIL, Technical documentation, assisting with level 1, level 2 engineering and site support engineers, team building and coordination, end user services, Service now
Projects
Infrastructure Projects: Cyber-Ark and Beyond trust EPM upgraded the infrastructure ,deployed and managed 170000 global users
Implementing of defence in Depth, Network Security
Management, Governance, Operations, and Assurance
Python
Powershell
COBIT 2019 ® Foundation Certification Training
Offensive security
Cyber security Penetration
COBIT 2019 ® Foundation Certification Training
Beyond Trust Privilege Management Administration V21
Palo Alto Cybersecurity
Fundamentals of Network Palo Alto NetworksSecurity
Level 1: Trustee Exam CyberArk
Microsoft Certified IT Professional: Enterprise Support Technician
Microsoft Certified Technology Specialist: Exchange Server 2007 ConfiguringMicrosoft Certified Technology Specialist: Exchange Server 2007 Configuring Microsof
IT Information Library Foundations Certification (ITIL)