Summary
Overview
Work History
Education
Skills
Accomplishments
Certification
Languages
Timeline
Generic

VARUN KUDROLI

Summary

Highly skilled and results-oriented experienced cybersecurity professional with over 7 years of experience in threat detection, incident response, and security operations. Skilled in utilizing SIEM tools, conducting thorough security analyses, and implementing proactive security measures. Seeking a cybersecurity analyst role to contribute my expertise to enhance the security posture of an organization.

Overview

7
7
years of professional experience
1
1
Certification

Work History

Cyber Threat Intelligence Analyst

Rapid Staffing and Training Solutions
01.2023 - 04.2024
  • Smoke Screen - Admin, use-case testing, investigation.
  • CounterCraft - Implementation, use-case testing, Admin, investigation.
  • Cyware - Admin, dashboard creation, use-case creation, daily report fetching, investigation, CSAP, Threat Investigation, Threat Intel Integration - Auto-ISAC, Space-ISAC, Z-CERT, IDRBT, MISP, Alien Vault, Mandiant, Recorded Future.
  • FS-ISAC - Intel Gathering, IOC blocking, involved in real-time intel convo etc.
  • Recorded Future - Brand module, Threat module, SecOps module, Identity module, Attack Surface module, Intel gathering, Threat Review - Industry Risk, Trends, Global Trend, Ransomware Dashboard, Research - Insikt Group Notes - reports analysis, Sandboxing, IOC fetching, breached investigation, breached validation, Intel validation, Threat Investigation.
  • Mandiant - Sandboxing, Digital Threat Monitoring, Threat Investigation, Report Analysis, Investigation based on Threat actor - TTPs/IOCs, Campaigns based investigation, Malware and tool - trending and most applicable Malware for our infra investigation, APT groups - Attacks/Malware/Campaigns investigation and blocking their IOCs etc.
  • iZOOlogic - Brand abuse - takedown brand abuse website, Social Media Pages/Groups/Handlers those are using our logos, similar named sites, similar named social media Pages/Groups/Handlers, takedown our company executive fake Social Media account, remove our company official application from third-party sites etc.
  • UpGuard - Vulnerabilities management for IPs and domains, Data Leak, Identity breach, Typo Squatting.
  • Zerofox
  • Social Links - use as OSINT.
  • Encase - for forensics.
  • Advisory Reporting - NCIIPC, Cert-IN, FS-ISAC, Cyware, Recorded Future, Mandiant, Alien Vault, Open Sources.
  • Vulnerability Advisory Reporting - Cert-IN & Open Sources.
  • SOP - Creation SOP for Deception tool alerts for investigation.
  • Client handling, attend & handle daily call with client.
  • Logs analysis that shared by regulatory for inbound & outbound traffic with malicious IPs.

SOC Analyst

Rapid Staffing and Training Solutions
03.2017 - 12.2022
  • Worked in a 24x7 Security Operations Center.
  • Deep dive analysis of triggered alerts using SIEM(Splunk ,QRadar), SOAR and other analysis tools.
  • Act as first level support for all Security Issues.
  • Analyzing Realtime security incidents and checking whether its true positive or false positive.
  • Performing Real-Time Monitoring, Investigation, Analysis, Reporting and Escalations of Security Events from Multiple log sources.
  • Worked on monthly patching activity for Security patches.
  • Raising true positive incidents to the respective team for further action.
  • Escalating the security incidents based on the client's SLA and providing meaningful information related to security incidents by doing in-depth analysis of event payload,
    providing recommendations regarding security incidents mitigation which in turn makes the customer business safe and secure.
  • Strong understanding of various SOC processes like monitoring, analysis, playbooks, escalation, incident documentation, SLAs, report walk throughs, bridge calls, etc.
  • Worked on EDR (O365 Defender, sentinel one), McAfee EPO for better investigation of alerts.
  • Contacting the customers directly in case of high priority incidents and helping the customer in the process of mitigating the attacks.
  • Determined the scope of security incident and its potential impact to Client network; recommend steps to handle the security incident with all information and supporting evidence of security events.
  • Monitoring security systems and networks for anomalies using UEBA Tool.
  • Investigate malicious phishing emails, domains, and IPs using Open-Source tools and recommend proper blocking based on analysis.
  • Doing the troubleshooting if any device is not sending the logs to the SIEM tool.

Education

Bachelor of Computer Applications -

Sikkim Manipal University
India
12.2016

Skills

    Recorded future
    Mandiant
    Cyware
    iZOOlogic
    FS-ISAC
    ZeroFox
    Regulatory - Cert-IN, NCIIPC

    Splunk ES
    QRadar
    O365 Defender
    Service Now
    Mcafee EPO
    Cortex XOAR

Accomplishments

Log Analysis

Wireshark

Network Security

Incident Response

OSINT

Trend Micro

MITRE ATT&CK

Recorded Future

Certification

  • Certified Ethical Hacker (CEH), EC-COUNCIL, ECC05907590114


  • Computer Hacking Forensic Investigator (CHFI) v9, EC-COUNCIL, ECC52139305270


  • Certified Secure Computer User (CSCU) v1, EC-COUNCIL, ECC40201716246


  • CompTIA Network+ Certified, 69965CPG2HE1SJX9


  • Red Hat Certified Engineer (RHCE 6.5), 140-084-104


  • Red Hat Certified System Administrator (RHCSA 6.5), 140-084-104

Languages

English
Hindi

Timeline

Cyber Threat Intelligence Analyst

Rapid Staffing and Training Solutions
01.2023 - 04.2024

SOC Analyst

Rapid Staffing and Training Solutions
03.2017 - 12.2022

Bachelor of Computer Applications -

Sikkim Manipal University
  • Certified Ethical Hacker (CEH), EC-COUNCIL, ECC05907590114


  • Computer Hacking Forensic Investigator (CHFI) v9, EC-COUNCIL, ECC52139305270


  • Certified Secure Computer User (CSCU) v1, EC-COUNCIL, ECC40201716246


  • CompTIA Network+ Certified, 69965CPG2HE1SJX9


  • Red Hat Certified Engineer (RHCE 6.5), 140-084-104


  • Red Hat Certified System Administrator (RHCSA 6.5), 140-084-104
VARUN KUDROLI