Cyber Security Analyst with 2 years of experience in detection and response with good knowledge of networking, XDR, SIEM, Linux, and VAPT.
· Networking
OSI & TCP/IP models, Common Networking Protocols, IP Subnetting, Routing, VLANs, NAT & ACLs
Hacker Methodology, Familiar Tools - Nmap, Metasploit Framework, Burp suite.
Installing and Configuring Firewalls, creating Firewall Security policy rules, and configuring VPNs.
Crowd strike, Cortex XDR, and sandbox have good knowledge of implementation, monitoring detections and handling incidents on the endpoint level, and creating reports, and dashboard report
Familiar with basic concepts and have experience
Splunk and OSSIM Tools like creating basic Correlation rules, policy alerts, Triggers, and log monitoring.
Burp suite, OwaspZap, Nessus, Wireshark, Process Hacker, Processor Monitor, NMAP, Any run, joesanbox, kape, MFT, hybrid analysis, abuseIPDB.
AWS and Microsoft Azure. I can create a virtual machine, and configure s3 buckets and blobs. Also, I am a bit familiar with the JIT rule and Microsoft Azure Defender.
I hereby declare that the information provided is true to the best of my knowledge and belief