Working as a Security Analyst with 6+ years of expertise in conducting investigations of diverse incidents such as Ransomware, Malware, Exploits, BEC, and additional cyber-attacks, effectively determining the appropriate course of action to mitigate risks and safeguard against potential threats. Performed advanced threat hunting to proactively identify and mitigate potential risks, while formulating hypotheses for detecting previously undetected alerts.
Overview
7
7
years of professional experience
Work History
Security Analyst
Arete IR
09.2021 - Current
Conduct thorough investigations into suspicious and malicious activities utilizing SentinelOne, performing in-depth triage analysis to identify attacker footholds, active malware, compromised user accounts, and other indicators of compromise.
Perform comprehensive analysis of diverse incidents such as Ransomware, Malware, Exploits, BEC, and additional cyber-attacks, effectively determining appropriate course of action to mitigate risks and safeguard against potential threats.
Deployment of Arisnal Storyline Active-Response (STAR) rules, utilizing advanced Threat Hunting techniques to proactively detect and neutralize threats linked to threat actor activities and breaches.
Conduct detailed host investigations using Windows event logs, Netstat analysis, remote endpoint access and perform Forensics.
Maintain comprehensive documentation for SOC procedures, S1 deployment, support, and troubleshooting, while generating daily progress reports for S1 deployment during engagements.
Formed part of security team that embedded ransomware response plans which lowered impact of cyber-attacks by 60%.
Increased internal/external customer satisfaction by 40% due to creating detection rules in Sentinel One EDR.
Enhanced security process efficiencies by 35% through detecting anomalous activity by providing 24/7/265 detection support, and driving response capabilities.
Consultant
Ernst & Young
10.2019 - 08.2021
Performing cyber defense incident response, analyze security alerts, and performing analysis with various technologies such as QRadar, Sumologic, Dark Trace, TrapX, PhishMe, Azure AD, Azure, ATP, AWS Guard duty. Identify risks, apply threat hunting principles, and create hypotheses for undetected alerts.
Investigate hosts based on Windows event logs and Netstat to identify executing processes and detect fileless malware.
Utilize tools like Volatility, Eric Zimmerman's Registry Explorer, and Shell Bag Explorer, as well as Redline.
Perform analysis and investigations of phishing emails, spam, and security advisories for emerging threats in client infrastructure.
Proactively gather threat intelligence from global feeds and work with Microsoft Azure cloud security platforms.
Worked on data breach incidents involving PII, sensitive data, employee-centric information, and consumer data.
Address incidents belongs to cybersquatting, domain fluxing, and domain impersonation.
System Engineer
Tata Consultancy Services Pvt. Ltd
12.2016 - 10.2019
Handled administration activities such as rule creation, dashboard development, and integration of log sources into SIEM.
Proficient in Falcon Insight Endpoint Detection and Response, including understanding its architecture and technical fundamentals.
Create and modify prevention policies, update sensors and USB device policies, implement whitelisting and prevention hashes.
Conduct monthly map scans and weekly vulnerability scans using Qualys.
Collaborate with Qualys team to ensure timely scanner and signature updates.
Perform vulnerability assessments and assign vulnerabilities to respective teams for remediation.
Manage Symantec endpoint security operations, including USB exceptions, application whitelisting, GUP policy modification, and malware incident troubleshooting.
Develop policies based on project team requirement and review threat intelligence and investigate indicators of compromise (IOCs).
Conduct real-time monitoring and analysis of security events for operational security purposes.
Skills
Incident Response & Digital Forensics
Threat Hunting
Endpoint Detection and Response (EDR): SentinelOne, Falcon Crowdstrike, Windows Defender
Advanced Threat Protection (ATP)
SIEM: QRadar, Sumo Logic, Alien Vault
AI for Cyber Defense: Dark Trace, TrapX
Business Email Compromise
Proxy: McAfee, Forcepoint
Antivirus: Symantec, Cylance Protect
Accomplishments
Certified in SentinelOne Core Workshop
Network Security Specialist (ICSI)
Vulnerability Management (Qualys)
Certified in Sumo Logic Fundamentals and Administration