I have around 12 years of experience as a vulnerability management consultant, with 3.5 of those years spent in the United States (H1B). My experience includes working with vulnerability management tools like Qualys, Tenable, Rapid7, SCCM, Intune, software distribution, batch and powershell scripting, ITIL.
Responsibility for managing the end-to-end vulnerability management workflow and remediation
Acts as lead on incident and vulnerability remediations
Years of Experience, working with Vulnerability management tools (Qualys, SCCM, Intune, Tenable, Others)
Demonstrated knowledge of Systems Administration/Engineering with proficiency in analyzing systems designs with a systems security mindset
Strong knowledge of threats and vulnerabilities associated with cloud and on-premise devices
Strong analytical and problem-solving skills and proactive thinking skills
Drive automation of vulnerability management platform and processes
Demonstrated understanding of vulnerability scanning
Understanding of how to classify and prioritize the risk of new vulnerabilities based on the operating environment
Develop and maintain metrics and reports on vulnerability findings and remediation compliance(SLA)
Provide technical support to system and technology owners to propose mitigation and remediation solutions
Document and report on processes and procedures
Provide input to leadership for enhancing the vulnerability management strategy
Resolve the vulnerabilities that have been identified using SCCM, Intune, and scripting (PowerShell, bat, etc.)
Creating SUGs with the most recent Windows updates each month and deploying them on all servers and deskside machines on time.
Performing Monthly patching for about 10,000 servers and deskside machines via SCCM and Intune
Since I began working for my current organization (HCL), I have fixed about two million vulnerabilities (low, medium, critical, and high).
Developing unique applications and packages, as well as custom configurations, to address vulnerabilities and apply the fix via SCCM and Intune to vulnerable systems.
Resolved about three million vulnerabilities (low, medium, critical, and high)
Performing Monthly patching on 10K+ servers across enterprises with SCCM CB
Creating customized packages to resolve vulnerabilities and perform custom settings on servers across Enterprise. Creating SUGs with the latest released Windows patches every month and deploying them on all the servers in the environment as per the planned schedule
Maintaining Services and Applications running on Servers.
Upgrading server OS to latest versions.
Decommission and on boarding of servers as per customer need
At work as an ITIL SPOC and point of contact for all Change Requests, I need to create Change requests for all new changes in the infrastructure and need to drive Change tickets to closure by working with multiple stakeholders. Example: Monthly Patching, Vulnerability patching etc.
Need to create Problem tickets for all the problems occurring in the Infrastructure after Monthly patching/Vulnerability patching and create RCA for the same and need to drive Problem tickets to closure by working with multiple stakeholders
Need to create Incidents for all the errors during Monthly patching and take them to closure
Implemented WSUS in Microsoft Account which helped in Streamline the Patching Process. Responsible for implementation, and experience of Microsoft System Centre Configuration Manager CB
Responsible for building and maintaining desktop and server images, producing, and employing Group Policy Objects to manage the environment
Responsible for deploying images and applications using multiple methodologies, including SCCM, MDT, WDS, etc. using Lite Touch or User Driven Installation capabilities. Configured Azure Cloud Management Gateway, cloud distribution point and Auto Pilot to manage remote SCCM clients over the internet, in the absence of a VPN solution. Deploy security updates using SCCM Software Update Point (SUP) and Windows Server Update Services (WSUS)
Created collections and advertisements for software deployments
Automated all the manual activities with PowerShell which helped in Streamline the Patching Process
○ For example, Servers automated reboots as per schedule, Servers uptime through automated emails, created ADR automation, Created scripts to check PFR(Pending for reboot) and Script for getting Dynamic Servers counts from Infra, Scripts to get uptime with ping status, Script to clean-up C:\
Application Packaging using PowerShell and batch files by creating Application Model or Package model in SCCM 1910
○ For Example: .msi, .exe, Config Changes, Registry changes, Obsolete application uninstallation
SCCM
Microsoft Intune
Service now
Window Server & Endpoint patching
PowerShell, Batch & SQL scripting
Software Distribution
Vulnerability Management (Qualys, Tenable, Rapid7)
WSUS
ITIL
Excel
070-415: Implementing a Desktop Infrastructure.
070-680: Windows 7, Configuring.
AZ-103: Microsoft Azure Administrator.
Qualys certified Specialist