- Extensive experience of supporting and configuring Endpoint detection and response (EDR) tools. Extensive experience of supporting and configuring Security information and event management (SIEM) tools.
- Implementation of next-generation Intrusion Prevention solutions based on Palo Alto technologies Extensive experience of supporting and configuring Endpoint detection and response (EDR) tools.
- Proficient in network security protocols and technologies, including firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, and SIEM solutions.
- Extensive experience in conducting security assessments, vulnerability scanning, and penetration testing.
- Deep understanding of cryptographic protocols and encryption algorithms.
- Skilled in incident response and digital forensics, including evidence gathering, analysis, and reporting.
- Monitor network traffic for suspicious activities and investigate security incidents to determine the root cause and implement appropriate remediation actions.
- Collaborate with cross-functional teams to design and deploy secure IT solutions and infrastructure.
- Familiarity with cloud security principles and architectures (AWS, Azure, Google Cloud).
- Familiarity with cloud security principles and architectures (AWS, Azure, Google Cloud). Monitored and analysed security events using SIEM tools to identify potential threats and vulnerabilities.
- Conducted regular security assessments and penetration tests to evaluate the effectiveness of existing security measures.
- Monitored security logs and alerts to detect and investigate potential security breaches. Conduct regular vulnerability assessments and penetration tests to identify and mitigate potential security risks.
- Working on AWS Guard Duty Incidents
- Working on Crowdstrike EDR Alerts
- Working on EXtrahop Alerts for
- Continuous failed connection through RDP to servers
- Worked on Active Directory
- Working on DNS Txt Alerts
- Working on CertStram Alerts , consisting of blocking malicious domains
- Working on MFA(Multi Factor Authentication) and Account Take Over (ATO) Incidents
- Working on Credential Stuffing
- Working on ProofPoint for Phishing, SPAM emails
Tools: Crowdstrike, Splunk, Devo, DivvyCloud, Palo Allto, Cortex SOAR, Proofpoint Trap,
ProofPoint TAP, ProofPoint MTA, BlueCat, Airwatch, JamF, JoeSandbox, Active Directory,Office 365,Service Now