Highly skilled and results-oriented experienced cybersecurity professional with over 7 years of experience in threat detection, incident response, and security operations. Skilled in utilizing SIEM tools, conducting thorough security analyses, and implementing proactive security measures. Seeking a cybersecurity analyst role to contribute my expertise to enhance the security posture of an organization.
FS-ISAC - Intel Gathering, IOC blocking, involved in real-time intel convo etc.
Recorded Future - Brand module, Threat module, SecOps module, Identity module, Attack Surface module, Intel gathering, Threat Review - Industry Risk, Trends, Global Trend, Ransomware Dashboard, Research - Insikt Group Notes - reports analysis, Sandboxing, IOC fetching, breached investigation, breached validation, Intel validation, Threat Investigation.
Mandiant - Sandboxing, Digital Threat Monitoring, Threat Investigation, Report Analysis, Investigation based on Threat actor - TTPs/IOCs, Campaigns based investigation, Malware and tool - trending and most applicable Malware for our infra investigation, APT groups - Attacks/Malware/Campaigns investigation and blocking their IOCs etc.
iZOOlogic - Brand abuse - takedown brand abuse website, Social Media Pages/Groups/Handlers those are using our logos, similar named sites, similar named social media Pages/Groups/Handlers, takedown our company executive fake Social Media account, remove our company official application from third-party sites etc.
UpGuard - Vulnerabilities management for IPs and domains, Data Leak, Identity breach, Typo Squatting.
Zerofox
Social Links - use as OSINT.
Encase - for forensics.
Advisory Reporting - NCIIPC, Cert-IN, FS-ISAC, Cyware, Recorded Future, Mandiant, Alien Vault, Open Sources.
Vulnerability Advisory Reporting - Cert-IN & Open Sources.
SOP - Creation SOP for Deception tool alerts for investigation.
Client handling, attend & handle daily call with client.
Logs analysis that shared by regulatory for inbound & outbound traffic with malicious IPs.
SOC Analyst
Rapid Staffing and Training Solutions
03.2017 - 12.2022
Worked in a 24x7 Security Operations Center.
Deep dive analysis of triggered alerts using SIEM(Splunk ,QRadar), SOAR and other analysis tools.
Act as first level support for all Security Issues.
Analyzing Realtime security incidents and checking whether its true positive or false positive.
Performing Real-Time Monitoring, Investigation, Analysis, Reporting and Escalations of Security Events from Multiple log sources.
Worked on monthly patching activity for Security patches.
Raising true positive incidents to the respective team for further action.
Escalating the security incidents based on the client's SLA and providing meaningful information related to security incidents by doing in-depth analysis of event payload,
providing recommendations regarding security incidents mitigation which in turn makes the customer business safe and secure.
Strong understanding of various SOC processes like monitoring, analysis, playbooks, escalation, incident documentation, SLAs, report walk throughs, bridge calls, etc.
Worked on EDR (O365 Defender, sentinel one), McAfee EPO for better investigation of alerts.
Contacting the customers directly in case of high priority incidents and helping the customer in the process of mitigating the attacks.
Determined the scope of security incident and its potential impact to Client network; recommend steps to handle the security incident with all information and supporting evidence of security events.
Monitoring security systems and networks for anomalies using UEBA Tool.
Investigate malicious phishing emails, domains, and IPs using Open-Source tools and recommend proper blocking based on analysis.
Doing the troubleshooting if any device is not sending the logs to the SIEM tool.