Security professional with 5 years of progressive experience. Demonstrated skills identifying business risks and compliance issues and designing proactive solutions.
Overview
5
5
years of professional experience
1
1
Certification
Work History
Information Security Analyst
Google
11.2022 - Current
Conducting regular reviews of security events and incidents logged in Chronicle, prioritizing and escalating as necessary to ensure timely response and resolution
Monitoring network traffic and system logs for signs of suspicious activity, investigating and escalating as necessary
Conducting regular monitoring and analysis of Azure resource logs to detect anomalous behavior, potential security threats, and compliance issues
Monitoring security incidents using CrowdStrike Falcon platform, Helix, analyzing endpoint telemetry data, and threat intelligence feeds to identify indicators of compromise (IOCs) and malicious activity.
Making changes in playbooks as required.
Conducted security audits to identify vulnerabilities.
Supported legal teams in investigations involving cybercrime or data breaches, providing crucial technical expertise.
Investigated and resolved incidents of unauthorized access to sensitive information.
Optimized resource allocation by prioritizing identified risks based on their potential impact on business operations.
Reviewed violations of computer security procedures and developed mitigation plans.
Developed, tested and implemented security policies, plans and procedures for organizational protection.
Conducted internal audits to identify areas of improvement within the organization''s information security program.
Implemented security measures to reduce threats and damage related to cyber attacks.
Information Security Analyst
Mandiant
02.2022 - 11.2022
Monitoring SIEM environment using Helix and Chronicle (Siemplify) for security events and alerts to threat, intrusion or vulnerabilities
Monitor CrowdStrike Falcon alerts to identify potential security incidents
Investigate and analyze detections to determine the nature and severity of threats
Reviewed logs in Azure portal for security alerts, utilizing Azure Monitor and Azure Security Center to analyze activity logs, diagnostic logs, and security alerts
Reviewed security logs in AWS CloudWatch and S3 buckets to identify potential security incidents, using AWS services such as CloudTrail, VPC Flow Logs, and AWS Configurations.
Drafted security reports and metrics to track security performance and strategize improvements.
Analyzed network traffic and system logs to detect malicious activities.
Recommend improvements in security systems and procedures.
SOC Analyst
Atos-Syntel
10.2019 - 02.2022
Conducted in-depth log analysis using SIEM tools like McAfee, ArcSight to detect and respond to security incidents
Collaborated with cross-functional teams to improve incident response processes and procedures
Implemented security measures to protect against emerging threats
Monitoring security controls to ensure continuous compliance
Handling security incidents and reporting
Blacklisting domains and IP addresses identified during incidents
Conducted Vulnerability Assessment on Nessus and creating reports, providing remediation assistance
Performing Firewall audits using Nipper tool
Monitoring Security Scorecard for maintaining Company's score and conducting 0365 Compliance Audits.
Reduced false alarms by fine-tuning intrusion detection system configurations based on historical analysis of incidents.
Maintained accurate documentation of all SOC activities, facilitating knowledge sharing across the organization.
Collaborated with IT teams to implement effective security measures, safeguarding critical data and systems.
Education
Bachelor of Engineering - Computer Engineering -
St. Vincent Pallotti College of Engineering And Technology Nagpur
Information Systems Analyst /Information Security Analyst at Ministry of Interior (MOI)Information Systems Analyst /Information Security Analyst at Ministry of Interior (MOI)