Over all 6.2 years of work experience. Having 4.2 years’ relevant experience in Information Security and currently working as Security Analyst (Security Operation Center team). A competent professional in information security as Security Analyst. Hands on experience on Threat analysis and Security Monitoring and Operation. Experience on SIEM (Security Information and Event Management) tools like Monitoring real-time events using IBM Qradar and Sentinel One tools. Preparing daily, weekly, and monthly report as per client requirement. Investigating and creating case for the security threats and forwarding it to Onsite SOC team for further investigation and action. Experience on performing log analysis and analyzing the crucial alerts at immediate basis. Filling the Daily health checklist. Good knowledge on networking concepts including OSI layers, subnet, TCP/IP, ports, DNS, DHCP etc. Good understanding of security solutions like Firewalls (Palo alto), DLP, Anti-virus, IPS, Email Security etc. Hands on experience with Qradar SIEM tool for logs monitoring and analysis. Trainings: Security plus, SIEM, Incident Life cycle.
Handling security incidents as reported by individuals and automated systems on laptops and mobile devices. Dealing with Different kind of Offenses like Large outbound, SSH Connections, Excessive Firewall Denies, Exploit/Malware, Mobile phone connections, Authentication failure. Analyzing and Reviewing the Security logs, Audit logs. Prioritizing and differentiating between potential intrusion attempts and false traffic, alarms. Pro-actively handle security attacks in company environment and will provide work around to decrease the impact of the business. Monitor SIEM for new signatures/attacks in the environment, Analyze the Attack and escalate for further action to the concerned team.
English, Telugu, Hindi
I hereby declare that the above-mentioned information is correct up to my knowledge and I bear that responsibility for the correctness of the above-mentioned.