Summary
Overview
Work History
Education
Skills
Certification
Languages
Disclaimer
Timeline
Generic

Vinod T

Hyderbad

Summary

Profile Summary Incident Response, Intrusion Analysis and Network Security Monitoring. Experienced Information Systems Security professional dedicated to providing high quality services and positive results. Possess strong understanding of Security Operations and Incident Response process and practices. Have in-depth knowledge and understanding of the threat landscape and emerging security threats. Proven ability to leverage technology to achieve organizational objectives. Innovative problem solver whose areas of expertise include Security Event Monitoring, Log Analysis, Incident Management, Security Threat Analysis to protect computer systems.

Overview

5
5
years of professional experience
1
1
Certification

Work History

Security Analyst

Genpact
01.2024 - Current
  • Incident Response, Intrusion Analysis and Network Security Monitoring
  • Experienced Information Systems Security professional dedicated to providing high quality services and positive results
  • Possess strong understanding of Security Operations and Incident Response process and practices
  • Have in-depth knowledge and understanding of the threat landscape and emerging security threats
  • Proven ability to leverage technology to achieve organizational objectives
  • Innovative problem solver whose areas of expertise include Security Event Monitoring, Log Analysis, Incident Management, Security Threat Analysis to protect computer systems
  • Hands on experience in SIEM Platform (Ǫradar, Splunk, Ǫradar, AZURE Sentinel) Fine tuning the Use case based on the false positive detection
  • Developing SIEM rules that helps in detection of security incidents
  • Focused on Developing & Automating the Device Status Reports
  • Endpoint Security: Trend Micro office scan - Administration and troubleshooting Nessus (VA) performing the scan activities
  • Carrying out log monitoring and incident analysis for various devices such as Firewalls, IDS, IPS, database, web servers and so forth
  • Good knowledge of Azure
  • Developed use cases and rules to be developed into SIEM Azure sentinel platform
  • Knowledge of typical security devices such as firewalls intrusion detection systems Av and End point security web

Security Analyst

Ernst&Young
03.2022 - 01.2024
  • Responsible Handling Google review and identify things which Working in Security Operation Centre (24x7), monitoring of SOC events, detecting, and preventing the Intrusion attempts
  • Responsible to analyze and resolve ops incidents to reduce manual intervention
  • Tracking telemetry records for Hash/URL
  • Determining IOC's while threat hunting by correlating and analyzing a variety of application, network and host-based security logs and determining the correct remediation actions and escalation paths for each incident
  • Working in Collaboration with Threat Intelligence Team to be updated with latest attacks that can help in providing the more security services by creating daily Alert/News for latest attack
  • Monitoring the signature release and guiding customers to update to the latest signatures to cover the FP/FN files detected by Microsoft Windows Defender
  • Performed creation and configuration changes of prevention policies, Sensor update and USB device policies, White-listing, and prevention hashes
  • Expert in identifying and handling phishing attacks and Spam Emails by analyzing the message headers, Attachments, URL's and taking actions appropriately to block Sender, IP, Domain on firewall and email gateway and security tools like Proofpoint
  • Website Anti-Malware monitoring and real-time alerting based on anomalies detected
  • Generating reports based on cases triggered on Weekly, Monthly basis and providing it to t

Security Analyst

Tech Mahindra
02.2020 - 10.2021
  • Responsible Handling Google review and identify things which Working in Security Operation Centre (24x7), monitoring of SOC events, detecting, and preventing the Intrusion attempts
  • Responsible to analyze and resolve ops incidents to reduce manual intervention
  • Tracking telemetry records for Hash/URL
  • Determining IOC's while threat hunting by correlating and analyzing a variety of application, network and host-based security logs and determining the correct remediation actions and escalation paths for each incident
  • Working in Collaboration with Threat Intelligence Team to be updated with latest attacks that can help in providing the attack

Education

Graduation - Electronic and communication engineer

Institute of Technology
01.2019

Skills

  • SIEM: Sumo logic
  • Ǫ-Radar
  • Rapid7
  • Splunk
  • EDR: CrowdStrike
  • Email Analysis: Microsoft defender
  • IDS/IPS: Source fire
  • MacAfee
  • DLP: Code 42
  • Phishing Analysis: Proofpoint
  • Microsoft defender
  • MX tool box
  • PAM: CyberArk PAS
  • Network security: Fire eye
  • Wireshark
  • Ticketing tools: ServiceNow
  • Jira
  • Vulnerability Management Detection and Response: Ǫualys
  • Nessus
  • Endpoint Security Management Platform: Tanium-EDR

Certification

  • CEH V11
  • Splunk fundamentals
  • Sumologic fundamentals
  • CompTIA Network+

Languages

English
Telugu
Hindi

Disclaimer

I hereby declare that the information furnished above is true to the best of my knowledge.

Timeline

Security Analyst

Genpact
01.2024 - Current

Security Analyst

Ernst&Young
03.2022 - 01.2024

Security Analyst

Tech Mahindra
02.2020 - 10.2021

Graduation - Electronic and communication engineer

Institute of Technology
Vinod T