A go-getter with immense will power to accomplish the task assigned. An individual who maintains his calm in all situations and aspires to do the best. Confidence of handling all tasks with responsibility & offering best results. Extensive exposure to Cyber Security practices and processes related to Infosec. Actability to new concepts & ideas. Self-discipline, motivation, positive attitude and flair for hard work.
Proactive and versatile professional with a dedication to quickly adapting to new challenges. Strong problem-solving abilities and a proven track record of fostering strong relationships with clients and team members. Focused on supporting team success and achieving positive results.
Overview
11
11
years of professional experience
Work History
Expert Cyber Security Incident Responder
Finastra
01.2023 - Current
Leading and managing the SOC and Threat Hunting Teams, providing strategic direction, mentorship, and professional development
Develop and enforce policies, procedures, and best practices for SOC and Threat Hunting operations
Align the SOC and Threat Hunting activities with the organization's strategic security goals and objectives
Keeping Up to date Incident Management Policy and SOC Playbook
Identify areas of opportunity where security services can be optimised to improve to experience or reduce operational costs
Identify and implement process improvements to enhance the efficiency and effectiveness of SOC and Threat Hunting operations
Optimize workflows to eliminate bottlenecks and improve incident response times
To ensure cohesive security operations, foster collaboration between SOC, Threat Hunting, Vulnerability Management and other organizational teams
Conducting Table Top Exercise and Postmortem report post Table Top Exercise
Oversee the development and deployment of advanced threat detection methodologies and tools
Continuously evaluate and refine detection and response strategies to counter evolving security threats
Lead the analysis of security incidents to identify root causes and implement preventative measures
Direct the SOC and Threat Hunting Teams in responding to security incidents, ensuring timely and effective mitigation
Coordinate incident response activities with other teams, including IT, legal, and communications
Maintain comprehensive incident records and provide regular reporting on incident trends and metrics
Driving the adoption of automation technologies to reduce manual tasks and improve the accuracy and speed of threat detection and response
Evaluate, select, and integrate cutting-edge security technologies to enhance SOC and Threat-hunting capabilities
Collaborate with IT and development teams to ensure seamless security tools and automation frameworks integration
Monitor industry trends and emerging threats to ensure SOC and Threat threat-hunting teams are prepared to address potential risks
Implement continuous improvement initiatives to enhance SOC and Threat Hunting processes, tools, and team capabilities
Foster a culture of innovation and continuous learning within the SOC and Threat Hunting Teams
Communicate SOC and Threat Hunting activities, metrics, and outcomes to senior management and other stakeholders
Act as a liaison between the SOC, Threat Hunting Teams, and other departments to ensure effective collaboration and alignment of security efforts
Represent the SOC and Threat Hunting Teams in internal and external meetings, conferences, and forums
Ensure SOC and Threat Hunting activities comply with relevant regulations, standards, and organizational policies
Prepare and present regular reports on SOC and Threat-hunting performance, including key metrics and improvement initiatives
Sr. Consultant
NaviSite
05.2021 - 01.2023
Leading security incident management for Navisite and Its Customer
Develop and enforce policies, procedures, and best practices for SOC and Threat Hunting operations
Align the SOC and Threat Hunting activities with the organization's strategic security goals and objectives
Keeping Up to date Incident Management Policy and SOC Playbook
Identify areas of opportunity where security services can be optimised to improve to experience or reduce operational costs
Investigation of Critical and high alerts escalated by L2
Investigation and analysis of Event towards internal/external environment
Qualys Guard for Vulnerability Management
Working on SOPHOS/Crowdstrike EDR Incidents
Monitoring for emerging threat patterns and vulnerabilities
Investigation of infected Host Through Endpoint controls and monitoring
Phishing incidents investigations
Execute, and suggest improvements to the documented and repeatable security processes that ensure the Security of Navisite and for its customer Driving the adoption of automation technologies to reduce manual tasks and improve the accuracy and speed of threat detection and response
Administration of Tripwire FIM
Managing AWS Cloud Security
Working on Microsoft Defender, Azure Sentinel
EDR Solutions
Administration, Monitoring of DLP and Investigation of DLP Incidents
Coordinating with different stakeholders - technology teams, application specialists and business units
Identify security incidents and breaches and prepare and seek review of reporting and remediation activities
Communicates with management on incident updates
Manage and improve information security documentation as required
Conducting Table Top Exercise and Post Mortem report post Table Top Exercise
Compiling SOC (Security Operation Centre) Runbook
Review and Fine Tune for SIEM alerts
Making report on Current IT Threat landscape and upcoming trends in security
Ensure SOC and Threat Hunting activities comply with relevant regulations, standards, and organizational policies
Prepare and present regular reports on SOC and Threat-hunting performance, including key metrics and improvement initiatives
Participating in internal audit
Sr. Lead Security Analyst
One97 Communication Ltd (Paytm)
12.2020 - 05.2021
Leading security incident management for Paytm
Identify areas of opportunity where security services can be optimised to improve to experience or reduce operational costs
Providing Training Session on Cyber Security Topics to Team for Mentorship
Report on and suggest improvements to identified security metrics to gauge the effectiveness of Paytm security
Conducting Table Top Exercise and Post Mortem report post Table Top Exercise
Execute, and suggest improvements to the documented and repeatable security processes that ensure the Security of One97
Manage and improve information security documentation as required
Review and Fine Tune for SIEM alerts, DLP alerts
Monitoring for emerging threat patterns and vulnerabilities
Coordinating with different stakeholders - technology teams, application specialists and business units
Identify security incidents and breaches and prepare and seek review of reporting and remediation activities
Communicates with management on incident updates
Compiling SOC (Security Operation Centre) Runbook
Perform security monitoring, Investigation and analysis of Event towards internal/external environment
Log Analysis and event traffic patterns investigation
Investigation of infected Host Through Endpoint controls and monitoring
Managing Prisma tool (For Cloud Compliance)
Working on Palo Alto Cortex / CrowdStrike EDR Incident
Digital Forensic Investigation - Static and Dynamic
Providing Training Session on Cyber Security to Team
Analysis of Phishing Incidents
Administration, Monitoring of DLP and Investigation of DLP Incidents
Review of recurring activity for Automation
Making monthly report on Vulnerability
Managing AWS Cloud Security
Ensure SOC and Threat Hunting activities comply with relevant regulations, standards, and organizational policies
Prepare and present regular reports on SOC and Threat-hunting performance, including key metrics and improvement initiatives
Participating in internal audit
Infrastructure Security Engineer II
Innovaccer
10.2019 - 10.2020
Managing AWS Cloud, Azure Cloud Security
Administration, Monitoring of DLP and Investigation of DLP Incidents
Administration of Wazuh SIEM tool
Security Monitoring for AWS Cloud, Azure Cloud
Conducting Table Top Exercise and Post Mortem report post Table Top Exercise
Digital Forensic Investigation - Static and Dynamic
Monitoring for emerging threat patterns and vulnerabilities
Coordinating with different stakeholders - technology teams, application specialists and business units
Execute, and suggest improvements to the documented and repeatable security processes that ensure the Security of Innovaccer
Identify security incidents and breaches and prepare and seek review of reporting and remediation activities
Identify areas of opportunity where security services can be optimised to improve to experience or reduce operational costs
Manage and improve information security documentation as required
Perform security monitoring, Investigation and analysis of Event towards internal/external environment
Log Analysis and event traffic patterns investigation
Review and Fine Tune for SIEM alerts, DLP alerts
Investigation of infected Host Through Endpoint controls and monitoring
Analysis of Phishing Incidents
Report on and suggest improvements to identified security metrics to gauge the effectiveness of Innovaccer's security
Managing Compliance and Audit for HIPPA, ISO
Communicates with management on incident updates
Compiling SOC (Security Operation Centre) Runbook
Making monthly report on Vulnerability
Review DLP Daily and Weekly Reports
Consultant
Virtusa
07.2018 - 10.2019
Produce and maintain Standard Operating Procedures and appropriate documentation for SOC
Leading and managing the SOC and Threat Hunting Teams, providing strategic direction, mentorship, and professional development
Develop and enforce policies, procedures, and best practices for SOC and Threat Hunting operations
Align the SOC and Threat Hunting activities with the organization's strategic security goals and objectives
Keeping Up to date Incident Management Policy and SOC Playbook
Identify gaps, disseminate findings and reports to the system owners and follow up for closure
Analyse new security solutions, identify potential security concerns, develop approaches that can be used to mitigate identified risks and works with IT teams to implement recommendations
Classification of risk associated with data leakage
Identify and implement process improvements to enhance the efficiency and effectiveness of SOC
Research new and emerging threats to gain insight and understanding of the evolving threat landscape
Conducting Table Top Exercise and Post Mortem report post Table Top Exercise
Optimize workflows to eliminate bottlenecks and improve incident response times
To ensure cohesive security operations, foster collaboration between SOC, Threat Hunting, Vulnerability Management and other organizational teams
Conducting Table Top Exercise and Postmortem report post Table Top Exercise
Review and Fine Tune for SIEM alerts, DLP alerts
Oversee the development and deployment of advanced threat detection methodologies and tools
Continuously evaluate and refine detection and response strategies to counter evolving security threats
Lead the analysis of security incidents to identify root causes and implement preventative measures
Identify threat scenarios, quantifying the risks and working out and executing effective mitigation controls including evaluates security incidents and determines what response, if any, is needed and coordinates organization's responses, including technical incident response teams, when sensitive information is breached
Working on Microsoft Defender, Azure Sentinel
And CrowdStrike EDR alert
Taking remediation again data leakage and for in advert data disclosure
Analyse DLP (Network and Endpoint) events with High/Medium priority for confidential and company business data leakage
Review Proofpoint Report and Analysis of Phishing Incidents
Managing AWS Cloud, Azure Cloud Security
Evaluate, select, and integrate cutting-edge security technologies to enhance SOC and Threat-hunting capabilities
Collaborate with IT and development teams to ensure seamless security tools and automation frameworks integration
Direct the SOC and Threat Hunting Teams in responding to security incidents, ensuring timely and effective mitigation
Coordinate incident response activities with other teams, including IT, legal, and communications
Maintain comprehensive incident records and provide regular reporting on incident trends and metrics
Communicate SOC and Threat Hunting activities, metrics, and outcomes to senior management and other stakeholders
Act as a liaison between the SOC, Threat Hunting Teams, and other departments to ensure effective collaboration and alignment of security efforts
Represent the SOC and Threat Hunting Teams in internal and external meetings, conferences, and forums
Ensure SOC and Threat Hunting activities comply with relevant regulations, standards, and organizational policies
Prepare and present regular reports on SOC and Threat-hunting performance, including key metrics and improvement initiatives
Assess risks to IT systems' availability, integrity and confidentiality to ensure security and service continuity
Collecting data and creating regular reports of security related activity and SOC metrics
Senior Information Security Engineer
FIS Global Business Solutions Pvt. Ltd.
08.2016 - 07.2018
Handling High and Critical Incidents, events, and incidents escalated from analyst
Monitoring for emerging threat patterns and vulnerabilities
Identify and remediate or escalate gaps
Review and Fine Tune for SIEM alerts
Manage and improve information security documentation as required
Compiling SOC (Security Operation Centre) Runbook
Manage Internal Audit for SOC (Security Operation Centre)
Manage Documentation for ISO Audit
Fine Tune suggestions of IDS, Firewalls, network monitoring sensors
Perform network and system forensics in response to security incidents
Perform security monitoring, Investigation and analysis of Event towards internal/external environment
Log Analysis and event traffic patterns investigation
Making report on Current IT Threat landscape and upcoming trends in security
Review Low and Medium Severity Incidents work done by L1 Team Members
Providing Training Session on Cyber Security to CFC Team
Review Tripwire, PCI, CyerArk and Solidcore Reports
Analysis of Phishing Incidents
Analysis for Firewall, IPS/IDS logs
Malware analysis through FireEye Sandbox
Working with FireEye NX, FireEye CM, FireEye AX and FireEye HX tool
Working with LogRhythm, RSA SA, STRM and Arcsight SIEM Tools
Ticketing Tool- Archer, Service Now and CMS
Investigation of infected Host Through Endpoint controls and monitoring
Conducting Table Top Exercise and Post Mortem report post Table Top Exercise
Making Weekly and monthly report on Vulnerability
System Administrator
Blue Umbrella Pvt. Ltd.
10.2015 - 08.2016
Managing Window Server 2008, 2012, Managing Exchange Server 2010
Managing Kaspersky EPO Server
Managing Exchange Server
Report sensitive information stored on systems to ISO
Maintain user access administration
Disaster recovery planning
Disable unnecessary services on servers
Comply with password requirements, Review of Access control
Environmental protection (i.e., protection from possible exposure to water damage, excessive heat)
Firewall, Managing SonicWALL NSA TZ 600 firewall, Fort iGATE 90D
Vulnerability assessment of Server and web application
Implementation of ISO 270001 Security Audit
Install security patches to window server, EPO
Senior Faculty
Jetking Infotrain Ltd.
04.2014 - 10.2015
Maintaining Audit Documentation
Providing training of Ethical Hacking, Network Security, VAPT Training with kali Linux and Backtrack
LMS Implementation PAN India and Training of LMS
Preparing log sheet
Preparing assignment for students
Administration & Management of LABs for student
Giving the project to the students on real scenario
Take care all the labs updating & maintenance
Manage & update technical team including lab assistance
Education
B.sc Physics (Hons.) -
IGNOU
Senior Secondary -
C.B.S.E. Board
Secondary -
C.B.S.E. Board
Skills
Incident response
Threat detection
Policy development
Vulnerability management
Tabletop exercises
Process improvement
Documentation management
Cloud security
Team leadership
Automation implementation
Training & Development
References
Full referee details can be supplied upon request.
Global Certification
CISM, ISACA
CCSP Self-Paced Training, ISC2
CEH V8, ECC19310859484
ECSA V9, ECC28613978148 From EC-Council
Oracle Cloud Infrastructure Foundation Associate, Oracle
AWS Security Fundamentals, AWS
ISO 27001 Lead Auditor, BSI
PCI/DSS, Cybrary
MCSE 2012-Server Infrastructure, Microsoft
MCTS Hyper-V 2012 & System Centre, Microsoft
CCNA, Cisco
Phishing Countermeasure, IT Masters (Charles Sturt University)