Summary
Overview
Work History
Education
Skills
Certification
Telmobile
Operatingsystems
Mediatypes
Mobilephonetools
Harddisktools
Roles And Responsibilities
Personal Information
Othersoftware
Permanentresidence
Languages
Hobbies and Interests
Disclaimer
Timeline
Generic

HARIKESH YADAV

Navi Mumbai

Summary

Highly skilled Cyber Forensics and Malware Forensics expert with [number] years of experience in investigating cybercrimes, analyzing malware, and resolving complex digital forensic cases. Proficient in various digital forensic tools and techniques, with a strong understanding of operating systems, network protocols, and cybersecurity principles. Proven track record of successfully identifying, analyzing, and mitigating cyber threats..

Overview

9
9
years of professional experience
1
1
Certification

Work History

Digital Forensics Consultant

Nangia Andersen LLP
2021.06 - Current
  • Currently deployed at Client Location to NCFL Delhi
  • Cyber Forensic Examinations.

Scientific Assistant (Cyber Crime Department)

Directorate of Forensic Science Laboratories
Kalina Mumbai
2015.05 - 2016.05
  • Duties including all types of fraud investigations, credit card fraud, misuse of corporate assets including computer, telephone, mobile, and Laptop and network activity
  • Analysis of all the digital media
  • Analysis of password protected files
  • Acquire and preserve digital media in either a lab setting
  • This involves creating byte-by-byte forensic copies of original media for legal and investigative purposes
  • Perform data recovery, including files, folders and email recovery, on digital media to be analyzed during the course of a computer forensic investigation
  • Searching internet history for particular cases
  • Interact with Police Officer's to provide the highest quality of output in order to meet the policeman's desired outcomes
  • Conduct investigations involving analysis of digital media
  • Example analysis conducted includes but is not limited to: Searches for evidence of financial fraud and theft of trade secrets on computer media from desktops, laptops and server platforms
  • Searches for evidence of reformatting, dates of reformatting, and utilities used to wipe or copy data from digital media Locating evidence of improper removal, duplication, destruction, or transmission of e-mail messages or files.

Education

BSc IT -

Shobhit
2014-01

H.S.C -

Mumbai
2006-01

S.S.C -

Mumbai
2004-01

Skills

- Cyber Forensics:
- Digital evidence collection and analysis
- Incident response and threat assessment

Malware Forensics:

- Dynamic and static analysis

-IOC Scaning

Mobile Forensics

Certification

Computer Hacking Forensic Investigation (CHFI)

Telmobile

+91-9930052688

Operatingsystems

  • Linux
  • Windows
  • MacOS

Mediatypes

  • Hard Disk Drives (HDDs): Traditional spinning disk drives
  • Solid-State Drives (SSDs): Flash memory-based storage devices
  • Memory Cards: SD, CF, microSD, and other types of flash memory cards
  • USB Devices: Flash drives, thumb drives, and other portable storage devices
  • Mobile Devices: Smartphones, tablets, and other mobile phones
  • Optical Media: CDs, DVDs, Blu-ray discs, and other optical storage devices
  • Tapes: Magnetic tape storage devices, such as LTO and DAT tapes
  • Network Devices: Routers, switches, firewalls, and other network equipment
  • Cloud Storage: Online storage services like Dropbox, Google Drive, and iCloud
  • Virtual Machines: Virtualized environments like VMware, VirtualBox, and Hyper-V

Mobilephonetools

  • Cellebrite UFED
  • XRY
  • Oxygen forensic Detective
  • MSAB XAMN
  • Magnet AXIOM
  • MOBILedit

Harddisktools

  • Tableau forensic duplicator (TD2)
  • Image MASSter SOLO4
  • Forensic Toolkit (FTK)
  • Encase
  • Falcon Neo
  • MAGNET_AXIOM
  • Intella Pro
  • Digital Collector
  • Media clone
  • Ditto Dx
  • Autopsy
  • Belkasoft

Roles And Responsibilities

  • All types of fraud investigations, credit card fraud, misuse of corporate assets including computer, telephone, mobile, and Laptop and network activity
  • Analysis of all the digital media
  • Analysis of password protected files
  • Acquire and preserve digital media in either a lab setting. This involves creating byte-by-byte forensic copies of original media for legal and investigative purposes
  • Perform data recovery, including files, folders and email recovery, on digital media to be analyzed during the course of a computer forensic investigation
  • Searching internet history for particular cases
  • Interact with Police Officer's to provide the highest quality of output in order to meet the policeman's desired outcomes
  • Conduct investigations involving analysis of digital media. Example analysis conducted includes but is not limited to: Searches for evidence of financial fraud and theft of trade secrets on computer media from desktops, laptops and server platforms
  • Searches for evidence of reformatting, dates of reformatting, and utilities used to wipe or copy data from digital media
  • Locating evidence of improper removal, duplication, destruction, or transmission of e-mail messages or files

Personal Information

  • Age: 35
  • Date of Birth: 01/05/90
  • Gender: Male
  • Nationality: Indian
  • Marital Status: Married

Othersoftware

  • Elcom password recovery software
  • Passware for password recovery of files
  • OS forensic

Permanentresidence

India

Languages

  • English
  • Hindi
  • Marathi

Hobbies and Interests

  • Reading everything that gives knowledge
  • Playing cricket & carrom

Disclaimer

I hereby declare that information furnished above is true to the best of my knowledge

Timeline

Digital Forensics Consultant

Nangia Andersen LLP
2021.06 - Current

Scientific Assistant (Cyber Crime Department)

Directorate of Forensic Science Laboratories
2015.05 - 2016.05

BSc IT -

Shobhit

H.S.C -

Mumbai

S.S.C -

Mumbai
Computer Hacking Forensic Investigation (CHFI)
HARIKESH YADAV