Security Engineer with 9.10 year of experience in Information Security with emphasis on security operations, incident management, intrusion and OWASP top 10 vulnerabilities detection, threat hunting with Attack MITRE Framework, Falcon Crowd strike EDR and security event analysis through RSA Envision, MacAfee SIEM, SPLUNK Enterprise, Sumo Logic, Alien Vault , MDATP, Azure Sentinel, Crowd Strike.
Experience of working in 24x7 operations of SOC team, offering log monitoring, security information management, global threat monitoring.
Experience in monitoring Smokescreen, RSA WEB Threat Detection, PIM CyberArk and Arco's, Symantec DLP/ End Point
Good understanding of log formats of various devices such as Websense, Vulnerability Management Products, IDS/IPS, Firewalls, Routers, Switches, OS, DB Servers, and Antivirus etc.
Overview
11
11
years of professional experience
1
1
Certification
Work History
Associate Manager
Temenos
03.2021 - Current
Managed a Team of 6 Members of SOC Analyst/SOC Engineers and ensuring smooth running of 24
7 shift.
AS a part of Threat management security program done a POV for Threat intelligence Tool that includes visibility, detection, investigation and response and On-boarded enterprise version of Threat intelligence Tool and performed POV's for Open Source SIEM Tools.
Creating an Azure Sentinel use case involves integrating various data sources, applying MITRE ATT&CK framework techniques, and leveraging advanced hunting queries to detect and respond to threats effectively.
Develop advanced hunting queries to detect suspicious activities. You can use KQL (Kusto Query Language) on MDATP, Falcon Query Language (FQL) on Crowd Strike, SPLUNK query Language (SPL) on Splunk.
Implementing Recorded Future Diamond Model to analyzing cyber threats, focusing on the relationships between key elements (Adversary, Infrastructure, Capability, Victim) of an attack and adversary behavior, and developing use cases in SIEM and Develop and Implement Response Playbooks.
Recorded Future Intelligence Platform is used cover across adversaries and conduct pivoting analysis on Threat Intelligence to identify current impact or proactively process mitigations for defense through security technologies and proactive mitigations including zero-day patching identification, anomalous behavior, and recommendations of remediations actions.
Process both internal and external Cyber Threat Intel for determination of potential threat and impact, hunting to determine potential scope, and implementation of mitigations to defend Temenos, this includes reports from law enforcement, security researchers, industry leaders and governmental agencies.
Processes both internal and external Cyber Threat Intelligence for determination of impact, hunting to determine scope, and implementation of mitigations to defend Temenos Network.
As a part of Computer Security Incident Response Team (CSIRT) involved in Cyber Security Incident Response Process, Incident Handling, Incident Management and actcing like Forensic Analysts and Triage Analysts.
I have experience in incident response worked in different phase of incident life cycle like Preparation, Detection and Analysis, Containment, Eradication, and Recovery; and Post-Event Activity i,e we will alerted from a staff member or a third-party or via SIEM. After identifying incident, severity and category will be mapped.
As a part of containment, we will isolation portion of the network that is under threat and Remove malware from all infected devices, acknowledging the root cause of the attack, and take steps in the future to avoid similar attacks.
Ensuring the smooth running and maintenance of a comprehensive internal audit and External audit by engaging with ISO, PCI DSS auditor for evidence collection.
IT security specialist
Temenos
05.2019 - 03.2021
Security Event Monitoring and Threat Hunting Detection by using on the NIDS and HIDS is used SIEM (AlienVault - USM). SPLUNK, Sumo logic, Z-scaler Web proxy.
Z-scaler used to enforce Web Filtering policy and to Analyze the policy action, URL category, URL class, Client IP, Server IP and response code to find any malicious activity.
Symantec Anti-Virus - RISK / Network and Host Exploit Mitigation Logs will be monitored. Management server used to enforce daily definitions updates and periodic active and full scans on client computers.
Proofpoint, O365, CAS tool is used to monitor threat details having potential risks and Phishing mail campaign and enforce IOCs accordingly.
Microsoft Azure used to monitor web apps, databases, virtual machines, virtual networks, storage for multiple subscription and Directory.
Experience in Azure Sentinel, Microsoft Defender, Cloud App Security to monitor and identify cloud related Threat in PaaS, IaaS , Saas cloud computating environment.
Information Security Analyst
Happiest minds Technology IMSS
04.2016 - 01.2018
Working as an Information security analyst on Real time threat management using McAfee SIEM.
Monitoring McAfee NSM, HP NNM for finding Malware threats, Network Connection Issues, and other suspicious activities.
Creating Watchlists, Alarms, and Reports based on new threats and vulnerabilities.
Analyzing McAfee epos and McAfee DLP on periodic basis and escalate to concern team for any suspicious activities.
Monitoring Symantec End Point Manager (SEPM)logs and troubleshooting SEP related Issues.
Real Time Log analysis from different network devices such as Firewalls, IDS, IPS, router, switches Operating Systems like Windows, UNIX, Windows Servers, Web Servers, Antivirus and Domain controllers.
Performing Real-Time Monitoring, security incident handling, Investigation, Analysis, Reporting and Escalations of Security Events from Multiple log sources.
Handles malware incidents, analysis and investigating to reach to the core. Take the necessary steps to remove the malware.
Senior Security Engineer
NTT Communication Net-magic
01.2018 - 03.2019
Working as an Information security analyst on Real time threat management using McAfee SIEM.
Monitoring McAfee NSM, HP NNM for finding Malware threats, Network Connection Issues, and other suspicious activities.
Creating Watchlists, Alarms, and Reports based on new threats and vulnerabilities.
Analyzing McAfee epos and McAfee DLP on periodic basis and escalate to concern team for any suspicious activities.
Monitoring Symantec End Point Manager (SEPM)logs and troubleshooting SEP related Issues.
Real Time Log analysis from different network devices such as Firewalls, IDS, IPS, router, switches Operating Systems like Windows, UNIX, Windows Servers, Web Servers, Antivirus and Domain controllers.
Performing Real-Time Monitoring, security incident handling, Investigation, Analysis, Reporting and Escalations of Security Events from Multiple log sources.
Handles malware incidents, analysis and investigating to reach to the core. Take the necessary steps to remove the malware.
Information Security Analyst
Paladion Networks
10.2014 - 04.2016
RSA administration including health checks, database, and cross check all NIC services.
Login to all security device and check system load, CPU utilization.
Cross verifying VPN status in each shift by VPN concentrator.
Troubleshoot NIC services and restarting NIC services to determine log-stoppage.
Running specific RSA reports in case of port scan or web- application attack for analyzing and check reputation of IP to block perimeter ASA.
Produce documentation on content and use-cases developed.
Responsible for 24x7 SOC Operations including Log monitoring through RSA.
Experience in log monitoring, filtering, and report generation as per client's requirement.
Managing customer SLAs for real time alerting and response.
Real-time Phishing detection and follow-up with anti-phishing service providers for site takedown.
Configure the firewall to permit and deny traffic based on user-defined policies.
Maintaining timely backups of Firewalls.
Configuration of Access policies in Websense URL Filtering device.
Monitoring and troubleshoot the flow of email, detecting and handling unwanted spam in IronPort (Cisco).
Performed security incident detection, detailed investigation of incidents and managing Service Level Agreements (SLA) for real time alerting.
Experience with SIEM tool 'RSA Envision and MacAfee ESM'.
Experience with log management and security information management tools Nmap, Cisco IronPort, TRITON Websense.
Takes information from the vulnerability management team about vulnerabilities found and opens incident tickets against the appropriate assets.
Raising SR/CR tickets after analyzing Monthly/Weekly/Daily reports, and real time alerts.
Assigning tickets to specific teams and coordinating for resolving the tickets.
Maintaining escalation procedures.
Education
Bachelor of Engineering - Electronics and Communication Engineering