Having Hands-on experience on SIEM tools like Monitoring real-time events and analysis Security Monitoring and Operations, IBM QRadar, Splunk, DLP, Email gateway, EDR.
Knowledge of email security threats and security controls, including experience on analyzing email headers, Attachments and URL’s.
Create formal incidents and support the investigation of such incidents to not only mitigate the current threat but also prevent future occurrences.
Using various security tools to perform monitoring and analysis of security events to detect security risks and threats within established customer Service Level Agreements.
Differentiate the false positives from true intrusion attempts and help remediate / prevent.
Responsible for triage of a variety of alerts stemming from Malware, or Phishing attempts.
Real time monitoring and analyzing the logs by using SIEM tools for malicious activities.
Handling critical alerts from Endpoint Protection and working for resolution.
Analyze the nature and source of security threats, understanding their tactics, techniques, and procedures (TTPs).
Experience on performing log analysis and analyzing the crucial alerts at immediate basis.
Good knowledge on networking concepts including OSI layers, subnet, TCP/IP, ports, DNS, etc.
Can demonstrate good knowledge on MITRE ATT&CK, and Cyber Kill Chain methodology.
Good understanding of security solutions like Anti-virus, Firewall, IPS/IDS, Email Gateway, DLP etc.
Stay abreast of current threats and vulnerabilities, particularly those that may directly impact the Environment.
Preparing daily, weekly and monthly report as per client requirement.
Support escalation and work closely with stakeholders as required.
Worked closely with other teams to support the incident management process.
Overview
6
6
years of professional experience
1
1
Certification
Work History
Project Engineer
Wipro
Mumbai
10.2021 - Current
Work in a 24x7 Security Operation Center, monitoring SOC events and detecting/preventing intrusion attempts using IBM QRadar, CrowdStrike.
Played a key role in Monitor and analyze Proofpoint TAP, Email Security, and handle Phishing incidents to ensure the security of email communications.
Keeping up to date with the latest threats and trends in the cybersecurity landscape and utilizing threat intelligence to proactively defend against emerging threats.
Proactively checking for external cyber threats for new vulnerabilities, exploits, and Intrusion patterns, malware behaviors, based on signatures of collected IOCs.
Collaborating with Incident Response Team and SOC for effective detection, analysis and remediation of attacks, as well as researching potential IOCs.
Perform information security incident response and handling based on risk categorization and established procedures.
Perform technical investigations and RCA and recommend remediation techniques for the true positive incidents.
Customizing dashboards based on customer requirements using QRadar and developing reports, rules and trends.
Conduction of log & event analysis, incident investigation, reporting, and remediation within the QRadar SIEM and build use cases for various log sources to further enhance threat analysis.
Escalating the security incidents based on the client's SLA and providing meaningful information related to security incidents by doing in-depth analysis of event payload, providing recommendations regarding security incidents mitigation techniques.
Coordinated with other security teams to resolve the incidents.
Performing Log analysis & analyzing the crucial alerts at immediate basis.
Conducted comprehensive vulnerability scans using Qualys Tool, generating actionable reports to protect the organization against cyberattacks.
Prioritize vulnerabilities based on their criticality, potential impact, and exploitability, using CVE IDs as a reference for categorization.
Conduct in-depth analysis of identified vulnerabilities and prioritize patching efforts based their criticality, efficiently communicating vulnerability details to respective teams for immediate resolution.
Preparing documents & templates for escalations.
Preparing daily, weekly and monthly reports as per client requirement.
Security Analyst
VISTARA INFORMATICS PRIVATE LIMITED
Bangalore
08.2020 - 09.2021
Hands on experience on Threat analysis and Security Monitoring and Operation
Experience in Monitoring and Analysis on Proofpoint TAP, Email Security, Phishing Responsible in 24x7 SOC environment, proactively monitoring and reporting alerts using SIEM: Splunk, QRadar, EDR: Microsoft Defender for Endpoint (MDE), providing end to end Email security with Proofpoint.
Handled multiple alerts triggered based on cloud apps for Defender and took the appropriate actions.
Responsible for Phishing email investigations and taking appropriate actions to block the IOCs on security controls.
Monitoring, analyzing and responding to infrastructure threats and vulnerabilities.
Collecting the logs of all the network devices and analyze the logs to find the suspicious activities.
Investigating and creating case for the security threats and forwarding it to SOC team for further investigation and action and creating tickets in Ticketing tools.
Investigated on the DLP incidents and analyzed the events where the files were copied using USB devices.
Take appropriate and timely Follow-ups on Open Incidents and set next reminders if required. Hands on experience on ServiceNow ticketing tool. resolving within SLA through ServiceNow platform.
ensure that all incidents were investigated and resolved in a timely manner.
Inform L2 s about high severity alerts.
Performing Log analysis & analyzing the crucial alerts at immediate basis.
Monitoring Daily Health of devices and filling the Daily Health checklist.
Attend soc meetings and escalations calls.
Strong in team coordination and managing tasks.
Preparing documents & templates for escalations.
Preparing daily, weekly and monthly reports as per client requirement.
System Administrator
VISTARA INFORMATICS PRIVATE LIMITED
Bangalore
07.2018 - 08.2020
Monitor system performance and diagnose software/hardware problems.
Make recommendations to improve performance
Document and track issues via a ticketing system.
Ensured full and incremental data backups were successful.
Performed data restore for users as needed.
Manage backup and storage
Taking ownership of technical issues as well as escalated and high priority case handling.
Support users in a timely manner and ensure daily operational tasks are performed efficiently.
Education
Bachelor of Technology - Electrical, Electronics And Communications Engineering
Kakinada Institute of Technological And Sciences
Ramachandrapuram
06-2014
Some College (No Degree) - Board of Intermediate Education
Boon Junior College
Kakinada
03-2010
High School Diploma -
Smt GMD Modern High School
Ramachandrapuram
03-2008
Skills
SIEM Tools- QRadar, Splunk
Endpoint Security Tools- CrowdStrike, Microsoft defender for endpoint (MDE)
Ticketing tools-ServiceNow, JIRA
Data Loss Prevention (DLP)- Zscaler, Symantec DLP
Phishing Analysis- Proof point TRAP, TAP
Vulnerability Management and Penetration Testing (VAPT)- Qualys
Antivirus: Symantec Endpoint protection and McAfee
Operating System: Windows, Kali Linux
Languages
Telugu
First Language
English
Proficient (C2)
C2
Telugu
Proficient (C2)
C2
Certification
CCNA trained
CEH trained
CSA trained
Timeline
Project Engineer
Wipro
10.2021 - Current
Security Analyst
VISTARA INFORMATICS PRIVATE LIMITED
08.2020 - 09.2021
System Administrator
VISTARA INFORMATICS PRIVATE LIMITED
07.2018 - 08.2020
Bachelor of Technology - Electrical, Electronics And Communications Engineering
Kakinada Institute of Technological And Sciences
Some College (No Degree) - Board of Intermediate Education