Summary
Overview
Education
Skills
Aspiring SOC Analyst Seeking Opportunity
Websites
ROLES AND RESPONSIBILITIES
Certification
TOOLS AND TECHNOLOGIES
Timeline
Generic

Kiran Sajjan

Summary

  • Good Understanding on Basics of Computer Networks like OSI Model, TCP/IP, NAT, DHCP, DNS, Firewalls, IDS, IPS, and Networking Devices.
  • Proficient knowledge on Attacks and Mitigations and have been exposed to few analysis tools like virus total, Wireshark, Nessus etc.
  • Acquired good knowledge on CYBER KILL CHAIN framework, MITRE ATTACK, End Point security solutions like EDRs, XDR and network security solutions like IDS, IPS, firewalls and Cisco.
  • Have a good understanding on Threat intelligence and malware analysis and following up on new cyber threats into the market like zero-day attacks.

Overview

1
1
Certification

Education

Bachelor of Engineering -

KLE Tchnological University
Hubbali
05-2020

Skills

  • Threat Intelligence
  • Log Analysis
  • SIEM
  • Incident Response
  • Firewall Security

Aspiring SOC Analyst Seeking Opportunity

A Software Engineering undergraduate seeking opportunity in the cybersecurity field to work in a deterministic and challenging environment that will encourage and help me develop necessary skills and complete tasks with minimal supervision.

ROLES AND RESPONSIBILITIES

  • Best practice on Installing and working on Splunk instance with the Linux commands.
  • Adding new data sources from windows & Linux platform to Splunk instance.
  • Good practice on using accurate queries based on the type of instance required and hands on experience in using commands like GEOSTATS, DEDUP, TOP, SORT etc.
  • Working experience in operating SIEM solutions like creating Dashboards and Reports.
  • Raising tickets to concerned teams based on security incidents knowledge on documentation and report generation.

Certification

  • SOC Analyst Training at SocExperts
  • Security Fundamentals by FOXMULA
  • Splunk Fundamentals - Splunk

TOOLS AND TECHNOLOGIES

  • Operating system windows and Linux
  • SIEM SPLUNK
  • Malware Analysis compute hash
  • Endpoint security McAfee, Cisco
  • IPS Snort
  • Vulnerability Scanner Nessus
  • Network traffic analysis Wireshark
  • Threat Intelligence VirusTotal, Ipvoid

Timeline

Bachelor of Engineering -

KLE Tchnological University
Kiran Sajjan