Cybersecurity Analyst with strong foundation in threat intelligence, incident response, and penetration testing. Skilled in security operations, vulnerability assessment, and threat hunting. Proficient in using security tools such as Splunk, Wireshark, Nessus, Metasploit, Burp Suite, and EDR solutions. Hands-on experience with SIEM platforms, IDS/IPS, firewalls, and malware analysis tools. Adept at analyzing attack patterns, mitigating risks, and strengthening security defenses. Passionate about cybersecurity with a continuous learning mindset to stay ahead of evolving threats.
SiEM tools: Splunk, ELK
VAPT tools: Nmap, Kali linux, Nessus, OpenVAS, Wireshark, Metasploit Framework, Burp Suite, Nikto, Firewall, IPS, IDS
Open source tools: OWASP, OSINT, Google Dorks
Analysis: Threat Hunting, Malware and Phishing analysis, Network analysis
1. Splunk Configuration for Security Monitoring
2. Snort Intrusion Detection System (IDS) Configuration on Windows Description:
Key Responsibilities:
Skills Acquired:
Technologies Used: