Versatile, bilingual professional and ability to manage sensitive materials. Able to use various security tools to perform logs and packet analysis. Finally, can perform malware analysis with the overall objective to ensure confidentiality, integrity and availability of the systems, networks, and data
• Relavant 3+ Years of Experience in Cybersecurity/Information security Analyst with Proficient and Thorough Experience and Good Understanding of Information security.
• Specialized in proactive Network Monitoring of SIEM ( Splunk/Azure Sentinel)
• Security Analyst in Security Operation center(SOC) Environment on Splunk/Indexer/Search head and Azure Sentinel.
Diagnose and provide support on computer system issues, including debugging, correcting, repairing, servicing, examining, installing operating system and other software, training, and troubleshooting computer hardware, printers, and other peripherals. Provide assistance to Employees on the use of software and hardware
The Splunk/Azure Sentinel SIEM (Security Information and Event Management) Platform is an integrated set of products for collecting, analyzing, and managing enterprise event information. They include software and appliances for Event Collection
• Log Management
• Event Correlation
• Compliance Automation
• Identity Monitoring.The major components used in this project are Forwarder, Indexer, and Search head
Worked in a 24x7 Security Operations Center. Conduct log analysis using Splunk SIEM Tool. Analyse security event data from the network (IDS, SIEM). Perform static malware analysis on isolated virtual servers. Recognize potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. Monitoring and analysis of security events to determine intrusion and malicious events. Search firewall, email, web or DNS logs to identify and mitigate intrusion attempts. Investigate malicious phishing emails, domains and IPs using Open-Source tools and recommend proper blocking based on analysis. Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices Research new and evolving threats and vulnerabilities with potential to impact the monitored environment. Identify suspicious/malicious activities or codes. Hands on experience on the Incident Response activities like malware analysis, phishing analysis. Working on assign ticket queue and understanding and exceeding expectations on all tasked SLA commitments Escalating issues to level2 and management when necessary. Investigate incidents using Active Channels/ Dashboards/Events/Graphs/Annotations and reports. Monitor real-time security events on SIEM (Splunk/Azure Sentinel) console and Event Analysis and investigating and mitigation Good understanding on different types of attacks
Monitoring and perform in-depth analysis of security alerts using the Azure Sentinel platform. Exercise incident handling processes across Windows, Mac, and Linux platforms. Perform malware analysis. Perform remote remediation of malware or malicious activity. Develop and improve processes for incident detection, triage, and the execution of countermeasures Produce high-quality written and verbal communications, recommendations, and findings to customer management. Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking events. Supervise internal programs or teams. Serve as the technical escalation point and mentor for lower-level analysts. Provide oversight and quality assurance for issues worked by lower-level analysts. Assist in the advancement of security processes and procedures.
Marital Status : Married
Languages Known : English,Hindi,Telugu.
Preffered Location : PAN India
I Here by declare that the above furnished details are true and correct to the best of my knowledge
( BURA LAXMANNA)