Malware Forensics Investigation

Proactive professional with 7+ years of experience and a proven knowledge in aligning security processes with security standards, compliance, regulations, and business goals. Extensive experience in incident handling and management, threat hunting & malware
analysis, cloud security, auditing processes.
• Managing and Monitoring the console and clients.
• Risk Management and Compliance trend analysis.
• Installation, Upgrade and Uninstallation of McAfee clients.
• Installing and upgrading McAfee Agent / VSE / ENS.
• Exporting Installation packages and providing to requestor.
• Managing and administrating EPO Console.
• Troubleshooting if Manager Console is not updated.
• Trouble shooting non-compliant server’s issue, endpoint communication issue, availing adequate disk
• space for definition downloads on endpoints.
• Managing Application control.
• Implementing changes to the policies based on customers requirement and for enabling security on
• endpoints.
• Troubleshooting On Access Scan and On Demand scan issues.
• Soumyojit Sengupta
• 2Troubleshooting Performance related issues.
• Handling E-mail slowness issues regards to VSE
• Creation of User Defined Access Protection rules to achieve security based on Customer requirement.
• Troubleshooting issues and providing solutions though RDP, remote tool and Web-Ex sessions.
• Assisting in Standalone install and uninstall of product.
• Troubleshooting uninstallation failure.
• Troubleshooting Patch Update Failure from client side.
• Troubleshooting SuperDAT installation failure.
• Troubleshooting On Access Scan and On Demand scan issues.
• Troubleshooting Performance related issues.
• Creation of User Defined Access Protection rules to achieve security based on Customer requirement.
• Troubleshooting issues and providing solutions though RDP, remote tool and Web-Ex sessions.
• Assisting in Standalone install and uninstall of product.
• Troubleshooting uninstallation failure.
• Troubleshooting Patch Update Failure from client side.
• Troubleshooting SuperDAT installation failure.
• Manage AV Infrastructure of multiple accounts to ensure that the entire Infrastructure is AV compliant.
• Troubleshooting AV updates issues and communication related issues.
• Basic System engineering to troubleshoot install/uninstall.
• Handling and resolving malware related issues even while Antivirus is not functional.
• Supporting customer and onsite over call to push critical cases to closure at the earliest.
• Keeping a track of own ticket count.
• Taking ownership of the issues and closing remediate the issues within given timeline.
• Preparing and submitting customized trend reports to business team/customers on daily basis.
• Analysing Logs and providing solution.
• Upgrading and Patching Antivirus Products in use to ensure foremost security and product enhancements.
• Involving Vendors for availing support for product related issues, (if necessary).
Cybereason EDR
• Ethical Hacker: Vulnerability Analysis Concepts & Tools
• Ethical Hacker: ProxyChains & Enumeration
• Soumyojit Sengupta
• 8Ethical Hacker: Host Discovery & Scanning with Nmap
• Ethical Hacker: Footprinting
• Ethical Hacker: Pentesting, Laws, & Standards
• Ethical Hacker: Security Controls Part 2
• Ethical Hacker: Security Controls
• Ethical Hacker: Hacking Concepts
• CompTIA Cybersecurity Analyst+: Network Scanning & Traffic Analysis
• CompTIA Cybersecurity Analyst+: Malware Threats
• CompTIA Cybersecurity Analyst+: Attack Types
• CompTIA Cybersecurity Analyst+: Business Continuity
• CompTIA Cybersecurity Analyst+: Threat Mitigation
• CompTIA Cybersecurity Analyst+: Threat Monitoring
• CompTIA Cybersecurity Analyst+: Threat Intelligence
• CompTIA Security+: Security Assessment & Penetration Testing Techniques
• Malware Removal: Analyzing an Infected System
• SECOPS: IP Header Security
• Cloud Primer
Malware Forensics Investigation
Understanding of attack vector
Analysing Autoruns, Procexp, Procmon, TCP view data to figure out how exactly the Malware propagating
Thirst for working in scenarios where the business is majorly impacted and the Source of infection as well as sample needs to be identified
Keeping self-updated towards newly discovered Vulnerabilities and exploits and acting accordingly