Summary
Overview
Work History
Education
Skills
Certification
Skill Proficiency
Timeline
Generic

Megha Choudhary

Cyber Security Professional
Gurgaon

Summary

To be part of reputed organization which provides a steady state career growth along with job satisfaction, challenges and give contribution in success of organization.

Overview

10
10
years of professional experience
2013
2013
years of post-secondary education
6
6
Certifications
2
2
Languages

Work History

Lead- Vulnerability Management

Egon Zehnder
11.2023 - Current
  • Cyber Security Professional having 10+ years of experience in ICS industry.
  • Presently working as Vulnerability Team lead in Egon Zehnder.
  • I have experienced in managing vulnerabilities in Cloud, Infra, Network and Endpoint Devices.
  • Good experience in creating and executing vulnerability management plans.
  • Hands on experience on Crowd Strike, Tenable IO, WIZ.
  • Risk analysis to prioritize the vulnerability end to end plans.
  • Providing insights on program effectiveness and security posture to the leaders and security internal forums.
  • Managing tools and processes for identifying security weaknesses.
  • Understanding emerging cybersecurity threats and Efficient to work on exposure management and identify true exposure of vulnerabilities to the organization.
  • Also, Ensuring vulnerabilities are addressed efficiently
  • Collaborating with IT, compliance, and security teams to make remediation faster and reduce over all risk to organization.

Security Delivery Lead

Accenture Technology
05.2021 - 11.2023


  • I have worked as Threat and Vulnerability Management - Senior Technical Analyst at Accenture Technology since May'2021
  • Hands-on experience on SIEM, Endpoint Security, and Vulnerability Management tools, Azure Security Center Security Alerts.
  • Area of involvement: Event Management, Incident Management, Case Management and Reporting.
  • Having hands on experience Qualys, Kenna, Log Rhythm, McAfee Nitro, Sophos, Rapid7, O365, Carbon black and Darktrace.
  • Proficient in meeting tight deadline, adopting new technologies, ensure quality of deliverables in line with industry standards.
  • Analyze findings from security monitoring systems as Qualys Scanning, Network Configuration Compliance and Security Compliance.
  • Identify the requirements to build vulnerability aggregate analysis capability and execute based on those requirements.
  • Review all new and active vulnerabilities and share plan with remediation teams to fix the reported vulnerabilities.
  • Lead the product patch deployment and fixing the product vulnerabilities.
  • Manage the server OS patching procedure and security hardening.
  • Perform backup and restore of systems based on business requirement.
  • Support incident requests regarding vulnerability remediation, patching/remediation, metrics etc.
  • Drive remediation call with stakeholders to get a plan to fix the vulnerabilities within SLA.
  • Create overall Vulnerability dashboard to represent to Client on monthly basis.
  • Work on ADHOC request for newly published threats and security Advisories.
  • Provide all necessary reports and presentations on the status of remediation efforts and all gaps and potentials obstacles or issues to management and technical staff. Also work on exception approval request if requires.
  • Communicate/Highlight the risk to executive leadership associated to critical vulnerability and critical assets.
  • Review Runbook and update them in timely manner if requires any changes and get it approve.

Threat Hunting and Endpoint protection - Analyst

NTT Data Services Pvt Ltd.
01.2019 - 05.2021
  • Routinely conduct investigations into security data analytics use case findings; provide feedback to and work with data engineer and data scientists in order to develop and harden models.
  • Contribute to the tuning and development of security information and event monitoring systems (SIEM) use cases and other security control configurations to enhance threat detection capabilities.
  • Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious activity.
  • Perform hunting for malicious activity across the network.
  • Perform cyber security threat engineering activities with specific focus on countermeasure Tactics, Techniques and Procedures (TTPs).
  • Participate in team problem solving efforts and offer ideas to solve client issues.
  • Perform Log analysis of security events for all the possible threat.

Security Operation Center - Analyst

Ericsson Global Services India Pvt Ltd.
01.2017 - 01.2019
  • Monitor phishing attack using tools, analyze and create incidents if there is any alert triggered.
  • Monitoring Endpoint events using Sophos and Endpoint tools and creates incidents for AV team.
  • Dealing with Security Events from Security devices like IDS/IPS, Bluecoat, Antivirus etc.
  • Creating Daily task summary reports using SIEM.
  • Working on Threat Intelligence.
  • Parallel work with engineering team to sharpen the skills, e.g. Log Analysis, FW access logs, deep diving on Security Tools, etc.
  • Run scan using Qualys and generate reports.

Security Analyst

Altran Technologies India Pvt Ltd
01.2016 - 12.2016
  • Handle end user and security services consumer-initiated incidents and initiating trouble tickets.
  • Ensure delivering all services with clear reporting and responsibilities structure to maintain clear RACI.
  • Ensure that the SLA is maintained as approved by Customer.
  • Assign task and escalate it to appropriate contact for security events and response.
  • Analyze logs using SIEM tool to detect any anomaly with various use cases development for monitoring

Security Analyst

IKYA Human Capital Solution Pvt Ltd.
03.2015 - 12.2015
  • Raising tickets for any technical required changes through the ticketing system in Customer related to SIEM and monitoring tools activities such as change requests, service desk support, information gathering, opening/closing ports, etc.
  • Perform on-going optimization, configure additional use-cases, and suggest improvements as a continuous improvement process

Education

B.Tech - Electronics and Telecommunication Engineering

Gautam Buddha Technical University

12th - undefined

U.P Board

10th - undefined

U.P Board

Skills

Knowledge of infrastructure and security frameworks

Understanding of security technologies (IDS/IPS, SIEM, Anti-virus, Vulnerability Assessment/Management, DDoS)

Industry standard practices for Security Incidents and Management

undefined

Certification

Certified Ethical Hacker v10

Skill Proficiency

  • Knowledge of infrastructure and security frameworks
  • Identifying vulnerabilities and prioritizing mitigation strategies.
  • Understanding of security technologies like IDS/IPS, SIEM, Anti-virus, Vulnerability Assessment/Management, DDoS
  • Experience with industry standard practices and ticketing tools for Security Incidents and Management
  • Knowledge on Malware, Virus, Worms, Ransomware, Phishing Detection, Security threat and attack countermeasures
  • Knowledge on Threat Intel, Threat Hunting, Malware Analysis, and Anomaly Detection
  • Evaluating security risks and proposing solutions. Also, Securing cloud environments and networks.

Timeline

Lead- Vulnerability Management

Egon Zehnder
11.2023 - Current

Security Delivery Lead

Accenture Technology
05.2021 - 11.2023

Threat Hunting and Endpoint protection - Analyst

NTT Data Services Pvt Ltd.
01.2019 - 05.2021

Security Operation Center - Analyst

Ericsson Global Services India Pvt Ltd.
01.2017 - 01.2019

Security Analyst

Altran Technologies India Pvt Ltd
01.2016 - 12.2016

Security Analyst

IKYA Human Capital Solution Pvt Ltd.
03.2015 - 12.2015

12th - undefined

U.P Board

10th - undefined

U.P Board

B.Tech - Electronics and Telecommunication Engineering

Gautam Buddha Technical University
Megha ChoudharyCyber Security Professional