Summary
Overview
Work History
Education
Skills
Certificationstrainings
Accomplishments
Languages
Personal Information
Disclaimer
Timeline
Generic

Hasavath Gandhi

Hyderabad

Summary

Dependable and effective problem-solving professional with 4+ years of experience in Cyber Security field, interested in an Information Security position with the organization that can apply analytical, technical, and innovation skills to support and guard the organizations against security breaches.

Overview

4
4
years of professional experience
3
3
years of post-secondary education

Work History

Senior Consultant - Cyber Security

LTI Mindtree
05.2022 - Current
  • Responsible for carrying out System wide Vulnerability to access the security level of systems, Servers and network devices at client’s network
  • Provide input to leadership for enhancing the vulnerability management strategy
  • Prepare weekly/monthly reports submit it to platform teams for remediation
  • Knowledge of VM scanning tools Plan for scheduled and Ad-hoc scanning
  • Manage exception management process along with onsite
  • Document and report on process and procedures
  • Prepare prioritization approach for vulnerability
  • Track/follow-up open vulnerability and publish reports on regular basis & Host weekly remediation call with the platform teams
  • Supporting Teams in remediation process helping them in false positive analysis and tracking the closure
  • Creating/Modifying Hardening Document latest version based on Client requirements by using CIS Benchmarks
  • Monitoring/Maintenance, health check of security tools Daily
  • Performing Configuration Audit for OS, Network Devices, Database Servers using CIS Benchmark document
  • Providing error free reports to the clients and meeting the SLA’s
  • Run ADHOC scans immediately if any of the vulnerability majorly impacting the infrastructure worldwide
  • Prepare weekly/monthly executive dashboard to give a clear view of vulnerabilities to the management and platform teams
  • Troubleshooting QCA and Authentication issues
  • Track zero-day vulnerabilities, sending security advisory to client and platform teams to make them aware about impact of this vulnerability and to take necessary precautions
  • Prepare KPI and SLA reports and review the reports on a monthly basis
  • Security incident responses: Responsible for monitoring of security alerts
  • Analysis of logs generated by appliances, investigation and assessment or whether an incident is false positive or false negative
  • Finding the critical serves and application inventory from respective business owners and scheduling the scan weekly, monthly & quarterly basis
  • Scanning environment using Q-Radar Tool and finding the vulnerabilities based on the business units and sending reports to respective business owners
  • Monitored computer virus reports to determine when to update virus protection systems
  • Completed vulnerability scans to identify at-risk systems and remediate issues
  • Monitored use of data files and regulated access to protect secure information
  • Performed risk analyses to identify appropriate security countermeasures
  • Recommend improvements in security systems and procedures
  • Cultivated interpersonal skills by building positive relationships with others.Daily health checks on the servers and Endpoints. Daily Cisco AMP monitoring and agent communication with agent. Daily Cisco AMP updates and agent updating on endpoints. Daily monitoring DLP alerts Daily investigate the phishing email, Scanning the environment using Nessus tool and finding the vulnerabilities based on the business units and sending their port to respective business-owners Finding the Critical servers and application inventory from respective business owners and scheduling the scan weekly, monthly and Quarterly basis. Following end to end Incident Investigation and Incident Response process, ensuring to close the investigation within defined SLA Knowledge sharing session with the team members whenever complex incident issues are raised and also lessons learned from other team members. Attending calls with business owners, Windows and Linux team for scheduling the Vulnerability Management patching and remediation part without business disruptions. Identifying the threats that have entered into the network, and security gaps and vulnerabilities currently which are unknown. Responsible for Monitoring and analysis of events generated by various security and network tools like Firewalls, Proxy servers AV, IPS/IDS, Windows and Linux's servers Co-ordinate extensively with networking teams to maintain and establish communication to remote Q radar Collectors/Processors. Determine the scope of the security incident and its potential impact on the Client network recommend steps to handle the security incident with all information and supporting evidence of security events.

Security Analyst L1

Wipro Ltd
07.2020 - 05.2022
  • Investigating indicators of compromise (IOCs like file hashes, IP addresses, domains, etc.)
  • Leverages emerging threat intelligence (IOCs, updated rules, etc.) to identify affected systems and the scope of the attack
  • Creating Incidents for different severity alerts and following up until the case is closed with proper RCA
  • Weekly/Monthly incident analysis report
  • Analyzing the events and providing solutions for the incidents
  • Reporting malware, web application vulnerabilities incidents and maintaining tracker
  • Performing Real-Time Monitoring, Investigation, Analysis, Reporting and Escalation of Security Events from Multiple log sources
  • Publish weekly reports to applicable teams Generate monthly reports on SOC activity
  • Navigate the consoles to effectively correlate, investigate, analysis and remediate both exposed and obscure vulnerabilities to give situational awareness and real time incident response
  • Understanding of SIEM tools which collect, process, prioritize, correlate, monitor, and analyses enterprise generated events
  • Escalating the security incidents based on the client & SLA and providing meaningful information related to security incidents by doing an in-depth analysis of event payload, providing recommendations regarding security incidents mitigation which in turn makes the customer business is safe and secure
  • Creation of reports, dashboards and document the tickets fully with all the action taken for the incident and update it on frequent basis and maintain ticket quality by documenting it with all the required comments
  • Use the escalation process for multiple users impacting incidents all the time and keep update the management about the progress of incidents
  • Sending daily, weekly, and monthly reports to the customer who contain all the information about internet security, configuration changes, deny logs, failed logons, alert summary, machines without AV, network security etc
  • Performing Real-Time Monitoring, Investigation, Analysis, Reporting and Escalations of Security Events from Multiple log sources.

Education

B. Tech in Information Technology - EEE

Swarna Bharati Institute of Science And Technology
Khammam, India
10.2012 - 06.2015

Skills

    Vulnerability Management: Rapid7, Qualys Guard

    Security Tools: Qualys Scanner, Microsoft AD

    Cyber Security SIEM & SOC: IBM Q-Radar, Splunk

    Network Security & NGFW Firewalls: Cisco firepower, Fortigate

    End Point Security: Crowd Strike, Cisco Amp, MS Defender, Sentinel 1

    Phishing Email: KnowBe4, MS Defender

    Proxy tool: Cisco Umbrella

    DLP: Microsoft purview, Force point

    Other tools: Sandboxing technologies, OSINT

    Ticketing Tool: Service Now, Service 1, Mwatch

    Application Security: Forti4y,Synk

Certificationstrainings

Certifications&Trainings:

CertifiedEthicalHacker(CEH)

Enterprise and Infrastructure security( From NYU TandonSchoolof Engineering by New york University through Coursera)

Real Time Cyber threat Detection and Mitigation(From NYU TandonSchoolof Engineering by New york University through Coursera

Introduction to Cyber Attcks(From NYU TandonSchoolof Engineering by New york University through Coursera)

Cyber Attack Countermeasures (From NYU TandonSchoolof Engineering by New york University through Coursera)

Systems and Application Security (From ISC2 Through Coursera)

Accomplishments

    Got Medal from University level in Engineering collage Topper

    Got Sent marks in Core subject in Engineering with certificate in university level

    Have been added in Critical Resource in LTIMindtree organization.

Languages

English, Telugu

Personal Information

· Date of Birth: 06/06/1996

· Gender: Male

· Nationality: Indian

Marital Status: Unmarried

Disclaimer

· I hereby declare that the above information is true and correct to the best of my knowledge and I bear the responsibility for the correctness of the above-mentioned particulars.



Place:

Hyderabad

Timeline

Senior Consultant - Cyber Security

LTI Mindtree
05.2022 - Current

Security Analyst L1

Wipro Ltd
07.2020 - 05.2022

B. Tech in Information Technology - EEE

Swarna Bharati Institute of Science And Technology
10.2012 - 06.2015
Hasavath Gandhi