resm - Mahesh3535/MYrep GitHub Wiki
PROFESSIONAL SUMMARY:
β’ 3+ years of work experience as Analyst in SIEM and Enriched with knowledge in ArcSight SIEM Tool in Installation, Configuration and troubleshooting at connector level β’ Experienced in identifying potential threats and ensuring security of network systems β’ Analyzing problems, recommending solutions, products, and technologies to meet business objectives β’ Basic knowledge of system, network security, log analysis, and intrusion detection technologies β’ Basic knowledge of TCP/IP, firewalls, routers, and network protocols and technologies β’ Cyber threat incident response and incident auditing β’ Threat hunting in SIEM for Advanced persistent threats and targeted attacks β’ Created the knowledge base document for the recurring incidents, and encouraged the team to follow the same in all my projects β’ Helped with K.T and training for new recruits to learn the new technologies based on project and requirement β’ Worked in management activities like preparing Metrics deck, Project status report etc β’ Keen on achieving assigned targets and a quick learner.
TECHNICAL SKILLS:
β’ Security: ArcSight, RSA Netwitness, Qradar and Splunk,Symantec,Traps. β’ Ticketing Tools: ServiceNow, SharePoint β’ Packet Analyzer: Wireshark β’ Networking: Knowledge of configuration and maintenance, DHCP (Dynamic host configuration protocol), VPN (Virtual Private Network), DNS (Domain Name Service), Router configuration (static routing, dynamic routing), VLAN configuration., Cisco ASA.
CERTIFICATIONS:
β’ Completed βSplunk online Course and Certificationβ in Splunk Education Portal at Julβ17. β’ Completed βCertified Ethical Hackerβ certification from HB Services at Decβ18.
EDUCATION:
β’ B.Tech in Electronics and Communications, Aurora college, Telangana at 2015.
PROFESSIONAL EXPERIENCE:
Organization: HCL Technologies LTD, Navallur, Chennai Aug 2016 β Oct 2019 Project: SIEM Role: Cyber Security Analyst Technology: ArcSight,RSA Netwitness, Qradar and splunk, Symantec
β’ Providing Around the clock support for security event monitoring, analysis, triage incident alerting and reporting using ArcSight Security Information and Event Management SIEM management console β’ Troubleshooting connectivity and performing connector installation and tuning the configurations, filters, aggregations and correlation for the flow of events β’ Creating rules and Joint rules, verify Rules with events & Fine-tuned the real time rules to reduce the false positives β’ Technical analysis of network activity, monitors and evaluates network flow β’ Provide real-time guidance to customers on network configuration, security settings and policies, and attack mitigation procedures β’ Gathering and maintaining operational reports for Key Performance Indicators in Daily, Weekly and Monthly Metrics and Servers and Daily Health Check Monitoring β’ Analyze network flow data for anomalies and detect malicious network activity β’ Investigating indicators of compromise (IOCs like file hashes, IP addresses, domains, etc.) β’ Updating the clients regarding the current threat and latest vulnerability patches β’ Investigate arising incidents caused by malicious activities, and identified false positive β’ Defining Dashboards, Trends, Rules, Customized Reports and Scheduled Reports as per requirements β’ Creating Active list, Updating Active List and using rules to populate an Active List β’ Maintaining system documentation and configuration data for regulatory and audit purposes β’ Coordinate with integration team on log upload failures β’ Identification, investigation and escalation of security breaches to the Security team β’ Conducting network vulnerability assessments using tools to evaluate attack vectors, identify system vulnerabilities and develop remediation plans and security procedures β’ Creating new KB documents which would help the Analyst in analyzing risk events and troubleshooting methods β’ Coordinating with other teams in order to get some updates on the tickets β’ Identified security incidents and completed required documentation for system hardening
Declaration: I hereby declare that the above information is true and correct to the best of my knowledge and I bear the responsibility for the correctness of the above-mentioned particulars.
PROFESSIONAL EXPERIENCE:
Organization: HCL Technologies LTD, Navallur, Chennai Aug 2016 β Oct 2019 Project: End Point Security Role: Cyber Security Analyst Technology: Symantec, MacAfee.
Roles & Responsibilities:
β’ Managing tickets of enterprise security (Symantec Endpoint Protection) and providing remote support within internal SLA for clients.
β’ Handling host & server based security concerns with virus outbreaks. Guiding customers in designing SEP architecture, deployment of SEP clients, configuration of security policies and security event analysis.
β’ Experienced in Providing security fundamentals and preventing Anti-virus/malware, Spywares, Worms, Trojans, OS attack in client environments.
β’ Hands on experience Symantec DLP in L1 level and worked on incidents management within the time period before reaching client escalation.
β’ Incident response workflow for DLP incidents as raised through DLP tool.
β’ Providing guidance and training for less experienced engineers on Symantec DLP.
β’ Design and configuring Symantec endpoint protection setup in the client environment
β’ Experience in Handling Global Customerβs environment.
β’ Configuring Symantec endpoint protection workbench as per the client requirement.
β’ Preparing customized Symantec applications and polices as per the client standards and settings.
β’ Assist our clients in managing network security on critical systems (e.g., E-mail servers, database servers, web servers) Performing security monitoring and incident response activities in clients environment.
β’ Experienced in Installing, configuring & maintaining the Symantec endpoint protection Anti-virus software, pushing the update to clients on server level.
β’ Providing Symantec monitoring network-based IDS/IPS, Symantec Firewall, Application and device control, reporting threats, recommending security improvements in clientβs environment.
β’ Monitor Symantec environment, configuring SEPM Settings and Symantec Firewall Policies, Intrusion Prevention Policies, Antivirus & Antispyware Policies and Server Client communication policies, Replication, Live update Policies.
β’ Following ITIL process and raising RFCβs to schedule necessary implementation plan, Tentative time to complete, Request downtime is necessary, evaluate any possible impact and get approvals for any Change requests and implement accordingly.
Organization: Transunion,DLF, Chennai Nov 2019 β Present Project: SOC Role: Analyst Technology: ArcSight,RSA Netwitness, cylance,Ecat,and splunk, Symantec
β’ Managing tickets of enterprise security (ArcSight,RSA Netwitness, cylance,Ecat,and splunk, Symantec ) and providing remote support within internal SLA for clients. β’ Hands on splunck. β’ Hands on experience Symantec DLP in L1 level and worked on incidents management within the time period before reaching client escalation. β’ Incident response workflow for DLP incidents as raised through DLP tool. β’ Collaborate with other Information Security and IT team members to develop and implement innovative strategies for monitoring and preventing attacks. β’ RSA /Symantec DLP. β’ Good understanding of ISO 27001:2013 framework of policies and procedures that includes all legal in TU. β’ Good understanding of application in TU. β’ Providing Around the clock support for security event monitoring, analysis, triage incident alerting and reporting using ArcSight splunk Security Information and Event Management SIEM management consoles. β’ Hands on ecat and cylance alerts and phishing and account creation and source fire tickets. β’ Ticketing tool is Resilient. β’ Hands on remedy. β’ Bitsight alerts hands on experience.
Declaration: I hereby declare that the above information is true and correct to the best of my knowledge and I bear the responsibility for the correctness of the above-mentioned particulars.
===========================================================================
Professional Experience :
Tata Consultancy Services
Designation : IT Analyst
Role : Cyber Security Analyst
Functional Areas : Endpoint security, Email security, Network and Cloud security
Projects : Vulnerability Management, SOC, Threat Hunting, Forensics
Experience : 6 Years 6 Months
Duration : June 2014 to Till date
Responsibilities :
β Security events monitoring and detailed investigation of events triggered through the SIEM tool. β Monitored events through security tools, responded to incidents and reported findings. β Real time monitoring and analyzing the security alerts triggered and escalating the incidents to respective teams. β Vigilant monitoring of logs in SIEM related to the alerts (APT-C2/Exploit kit/WannaCrypt/Security Incident Response Process/Conficker/Active Directory authentication/Source Depot authentication/Remote Admin authentication) and performed the required mitigation steps. β Came across various Malicious softwareβs (computer viruses, worms, Trojan horses, ransomware, spyware, adware) and the procedure to curb them down. β Tackled and resolved various Information security incidents reported by the client. β Research, analyze and understand log sources utilized for the purpose of security monitoring, particularly security and networking devices (such as firewalls, routers, anti-virus products, proxies, and operating systems) β Classify the events into categories such as Social Engineering, Phishing and Spam Emails, Authentication, Malware, Unauthorized access, Network attacks and follow the complete incident lifecycle. β Analyzing suspicious emails (Phishing, Spoofed, Spam, or other) reported by end users and finding the legitimacy of those emails to determine the impact to the users and CORPNET and performing consequent mitigation steps. β Identifying and analyzing threats related to Network Attack, Brute force attack, Amplification attacks reported by customers and engaging the necessary parties as per requirement.
β Counter measures (such as full scan and flatten and rebuild) are suggested to users affected by technical scammers. β Raising of incidents and closure as per the SLA. β Extract the logs, perform real time log analysis using SIEM technologies. β Make recommendations for mitigating identified risks. β Administration through WDATP of approximately thousands of total assets distributed worldwide. β Utilized WDATP in Client enterprise to detect, investigate, and respond to advanced attacks and data breaches on their networks. β Dealing with issues related to Malware, Social Engineering Attacks, Policy violation, Authentication attempts, Network Attacks. β Proactive monitoring of several blogs and blocking the malicious IOCs at organization level. β Identifying misconfigured policies and suggesting necessary changes. β Worked on Sandbox for the validating suspicious attachments. β Executed queries on threat intelligence to identify the C2 IOCβs. β Monitor network traffic and security alerts for potential events/incidents. β Work with end users on issued remediation instructions based on the findings until the issue resolution. β Analyzing the web URLs via different web reputation engines to get them blocked/unblocked at the Network level and External firewall. β Handling L1 and L2 events for Global Microsoft Cloud (Azure Environment). β Specializing in Network security incidents also handled events on Copyright and Trademark infringement. β Working on Malware and Phishing complaints originating on the cloud environment. β Performing data collection regarding malware infections from WDATP and from the end user by sending appropriate notification and validating the data. β Provide malware status reports and dashboards. β Analyzing all social engineering scams reported by users and taking best suitable action to mitigate those scams. β Detect security alerts and perform end to end investigation through available resources and triage to identify the property/asset owners. β Acting SPOC in the team, handling shift video handoff calls with client. β Handling critical alerts like Repeated Failed Logins, WannaCry alerts. β Honey pot alert Handling. β Using Service Now, XR to handle and track all kinds of Incidents and tasks. β Monthly report generation on SEP and Bluecoat. β Maintaining a weekly and monthly Service Tracker for incidents progress. β Tracking overall security incidents reported from all regions on monthly basis and analyzing for any specific pattern or attacker/victim. β Vulnerability assessment, performing monthly and weekly vulnerability scans, remediating reported vulnerabilities, Scan engine update, enabling signature, Add/Remove IP address. β Automation of reports using Splunk.
Tools :
β Security Technologies and SIEM : ArcSight, Splunk β Firewalls : Palo Alto, FortiGuard β Endpoint Security and Threat Intelligence : WDATP β Operating Systems : Microsoft Windows and Linux β Desktop Application Software : MS Word, Excel, Outlook, PowerPoint β Ticketing Tools : SNOW, XR
Trainings & Certifications :
β’ Autopsy Training [Cert# ORD052084APR292020] β’ ZScaler Internet Access Professional [Cert# ed631a71-dd36-4cd4-a7e3-e34111d5c677] β’ ZScaler Private Access Professional [Cert# b295016d-8351-43d6-a932-d367b148c836] β’ Certified Ethical Hacker (CEH v11) [Cert# ECC5129836047]
Key competencies :
β SIEM Tool Management β Security Incident Management β Phishing and Spam E-mail Analysis β Endpoint Security β Analysis of network traffic β Malware Analysis
Achievements :
β Star performer in the Team for handling critical priority issues. β Won Applause Award in appreciation of outstanding performance to the organization. β Received On the Spot Award for handling unexpected crisis situation without any issues.
Educational Qualifications :
β Master of Science in Physics from Acharya Nagarjuna University with an aggregate of 66%. β Bachelor of Science from Andhra Loyola College (Autonomous) with an aggregate of 85%. β +2 from Kendriya Vidyalaya, CBSE with an aggregate of 74.6%. β 10th from Kendriya Vidyalaya, CBSE with an aggregate of 88.2%.
============================================================================
Responsibilities :
β Security events monitoring and detailed investigation of events triggered through the SIEM tool. β Monitored events through security tools, responded to incidents and reported findings. β Real time monitoring and analyzing the security alerts triggered and escalating the incidents to respective teams. β Vigilant monitoring of logs in SIEM related to the alerts (APT-C2/Exploit kit/WannaCrypt/Security Incident Response Process/Conficker/Active Directory authentication/Source Depot authentication/Remote Admin authentication) and performed the required mitigation steps. β Came across various Malicious softwareβs (computer viruses, worms, Trojan horses, ransomware, spyware, adware) and the procedure to curb them down. β Tackled and resolved various Information security incidents reported by the client. β Research, analyze and understand log sources utilized for the purpose of security monitoring, particularly security and networking devices (such as firewalls, routers, anti-virus products, proxies, and operating systems) β Classify the events into categories such as Social Engineering, Phishing and Spam Emails, Authentication, Malware, Unauthorized access, Network attacks and follow the complete incident lifecycle. β Analyzing suspicious emails (Phishing, Spoofed, Spam, or other) reported by end users and finding the legitimacy of those emails to determine the impact to the users and CORPNET and performing consequent mitigation steps. β Identifying and analyzing threats related to Network Attack, Brute force attack, Amplification attacks reported by customers and engaging the necessary parties as per requirement.
β Counter measures (such as full scan and flatten and rebuild) are suggested to users affected by technical scammers. β Raising of incidents and closure as per the SLA. β Extract the logs, perform real time log analysis using SIEM technologies. β Make recommendations for mitigating identified risks. β Administration through WDATP of approximately thousands of total assets distributed worldwide. β Utilized WDATP in Client enterprise to detect, investigate, and respond to advanced attacks and data breaches on their networks. β Dealing with issues related to Malware, Social Engineering Attacks, Policy violation, Authentication attempts, Network Attacks. β Proactive monitoring of several blogs and blocking the malicious IOCs at organization level. β Identifying misconfigured policies and suggesting necessary changes. β Worked on Sandbox for the validating suspicious attachments. β Executed queries on threat intelligence to identify the C2 IOCβs. β Monitor network traffic and security alerts for potential events/incidents. β Work with end users on issued remediation instructions based on the findings until the issue resolution. β Analyzing the web URLs via different web reputation engines to get them blocked/unblocked at the Network level and External firewall. β Handling L1 and L2 events for Global Microsoft Cloud (Azure Environment). β Specializing in Network security incidents also handled events on Copyright and Trademark infringement. β Working on Malware and Phishing complaints originating on the cloud environment. β Performing data collection regarding malware infections from WDATP and from the end user by sending appropriate notification and validating the data. β Provide malware status reports and dashboards. β Analyzing all social engineering scams reported by users and taking best suitable action to mitigate those scams. β Detect security alerts and perform end to end investigation through available resources and triage to identify the property/asset owners. β Acting SPOC in the team, handling shift video handoff calls with client. β Handling critical alerts like Repeated Failed Logins, WannaCry alerts. β Honey pot alert Handling. β Using Service Now, XR to handle and track all kinds of Incidents and tasks. β Monthly report generation on SEP and Bluecoat. β Maintaining a weekly and monthly Service Tracker for incidents progress. β Tracking overall security incidents reported from all regions on monthly basis and analyzing for any specific pattern or attacker/victim. β Vulnerability assessment, performing monthly and weekly vulnerability scans, remediating reported vulnerabilities, Scan engine update, enabling signature, Add/Remove IP address. β Automation of reports using Splunk.
=================================
To be an integral part of a professional Information Security team for applying my knowledge and Professional skills to add value to the organizationβs business and also achieve the corporate objectives whilst getting valued exposure and professional satisfaction along with personal growth. Experience: β’ Having overall 3.1 Years of experience in information security β’ Have experience and understanding on IBM QRadarand Knowledge on ArcSight SIEM β’ Proactively monitor the clientβs IT infrastructure for security events from the various SOC entry channels (SIEM, Tickets and Emails), based on the security event severity. β’ Escalate the true positive incidents to the client to perform further investigation and implement the recommended security measures. β’ Participate in evaluating, recommending, implementing, and troubleshooting security solutions and evaluating IT security of the new IT Infrastructure systems. β’ Provide recommendations tuning and optimization of security systems. β’ Incident Analysis of potential intrusions, Coordination and Responding using ticketing tools like JIRA, ServiceNow. β’ Managing 24/7 Security Operations Center, where primary tasks include monitoring, analyzing and responding to Information Security incidents. β’ Stay up-to-date with emerging security threats including applicable regulatory security requirements. Education: B. TECH in Computer science and engineering from J.N.T.U.K (`ADITYA COLLEGE OF ENGINEERING &TECHNOLOGY), SURAMPALAM, A.P, India, passed out in the year 2014. Professional Experience: β’ Working as a Security Analyst in Suwin Software Solutions Pvt Ltd since Sep-2017 to present SOC ANALYST SIEM Technologies:IBM Qradar, HP Arc Sight,Splunk, McAfee Nitro, Logrhythm Security Tools & Technologies Experience
- IDS/IPS β Source Fire
- Threat Management - Fireeye *Firewall β Cisco , Palo Alto Firewalls ,Checkpoint *Endpoint solution - CrowdStrike
- Anti- Virus β Symantec, McAfee
- Vulnerability Analysis β Rapid7
- Virtualization and Cloudβ Amazon Cloud Administration,
- Ticketing Tools:- Jira , ServiceNow . ROLES AND RESPONSIBILITIES: β’ Monitor the security logs and alerts from various network and security devices like IPS, IDS, firewall, switches, routers, load balancer, web application firewall. β’ Monitor the SIEM, mail gateway for any unusual or malicious activities. β’ Checking health status for all devices in ESM. β’ Identify, investigate & recognize security incident based on their signatures, behavior and escalate them to relevant teams and suggest related solution. β’ Prepare weekly, monthly reports as per clientβs requirement and incident severity. ====================================================
PROFESSIONAL SUMMARY:
β’ 3+ years of work experience as Analyst in SIEM and Enriched with knowledge in ArcSight SIEM Tool in Installation, Configuration and troubleshooting at connector level β’ Experienced in identifying potential threats and ensuring security of network systems β’ Analyzing problems, recommending solutions, products, and technologies to meet business objectives β’ Basic knowledge of system, network security, log analysis, and intrusion detection technologies β’ Basic knowledge of TCP/IP, firewalls, routers, and network protocols and technologies β’ Cyber threat incident response and incident auditing β’ Threat hunting in SIEM for Advanced persistent threats and targeted attacks β’ Created the knowledge base document for the recurring incidents, and encouraged the team to follow the same in all my projects β’ Helped with K.T and training for new recruits to learn the new technologies based on project and requirement β’ Worked in management activities like preparing Metrics deck, Project status report etc β’ Keen on achieving assigned targets and a quick learner.
Technology: ArcSight,RSA Netwitness, Qradar and splunk, Symantec
β’ Providing Around the clock support for security event monitoring, analysis, triage incident alerting and reporting using ArcSight Security Information and Event Management SIEM management console β’ Troubleshooting connectivity and performing connector installation and tuning the configurations, filters, aggregations and correlation for the flow of events β’ Creating rules and Joint rules, verify Rules with events & Fine-tuned the real time rules to reduce the false positives β’ Technical analysis of network activity, monitors and evaluates network flow β’ Provide real-time guidance to customers on network configuration, security settings and policies, and attack mitigation procedures β’ Gathering and maintaining operational reports for Key Performance Indicators in Daily, Weekly and Monthly Metrics and Servers and Daily Health Check Monitoring β’ Analyze network flow data for anomalies and detect malicious network activity β’ Investigating indicators of compromise (IOCs like file hashes, IP addresses, domains, etc.) β’ Updating the clients regarding the current threat and latest vulnerability patches β’ Investigate arising incidents caused by malicious activities, and identified false positive β’ Defining Dashboards, Trends, Rules, Customized Reports and Scheduled Reports as per requirements β’ Creating Active list, Updating Active List and using rules to populate an Active List β’ Maintaining system documentation and configuration data for regulatory and audit purposes β’ Coordinate with integration team on log upload failures β’ Identification, investigation and escalation of security breaches to the Security team β’ Conducting network vulnerability assessments using tools to evaluate attack vectors, identify system vulnerabilities and develop remediation plans and security procedures β’ Creating new KB documents which would help the Analyst in analyzing risk events and troubleshooting methods β’ Coordinating with other teams in order to get some updates on the tickets β’ Identified security incidents and completed required documentation for system hardening
Resume
OBJECTIVE
Seeking a challenging profile which will provide opportunities for professional growth and advancement, where I can utilize my experience and acquired skills towards becoming a valuable team member.
CAREER SUMMERY
β’ Information Security Analyst with a total of 4 years of experience in monitoring, threats, unauthorized access, viruses, and a wide range of threats and Vulnerability Assessment. Well-versed in direct and remote analysis with strong critical thinking, communication, and people skills. β’ Able to thrive in fast-paced and challenging environments where accuracy and efficiency matter β’ Good written, Oral and Presentation skills. β’ Able to work in diverse surrounding, alone and in group settings. β’ Able to build successful rapport with coworkers, employees, and client.
TECHNOLOGIES AND TOOLS
ο SIEM Technology Splunk and Splunk ES, NTT Solutionary FortiSIEM ο Proxy and Websensors Cisco Web Security ο Vulnerability Assessment and Management Using Qualys ο Antivirus Solution Symantec-End Point Protection, MacAfee ο Ticketing Tool Service Now and CA Service desk ο Monitoring Tool FortiAnalyzer ο Email Security Gateway Barracuda.
KEY SKILLS
β’ Vulnerability Assessment (VM, Cloud Agent, WAS) β’ Splunk and Splunk ES, NTT Solutionary, FortiSIEM β’ Security Incident Management β’ Phishing and Spam email Analysis β’ Proxy Web Sensor Analysis β’ Anti-virus/End point Management β’ Privileged Account Management. Company : Black Knight Financial Services β Bhubaneswar. Period : Dec 2018 β Dec 2019. Role : IT Security Analyst. Operations : Monitoring and Analyzing Security Events, Vulnerability Assessment. Tool Used : NTT Solutionary, Qualys Vulnerability Manager, Forti Analyzer, : Barracuda Email Security Gateway, Live Absolute, FortiSIEM Management.
PROFESSIONAL EXPERIENCE & JOB RESPONSIBILITIES
Security Information and Event Management (SIEM)
β’ Experience in Security Monitoring and Operations. β’ Investigating and creating case for the security threats and forwarding it to Onsite SOC team for further investigation and action. β’ Preparing documents & templates for escalations. β’ Performing Log analysis & analysing the crucial alerts at immediate basis. β’ Reporting weekly / monthly dashboards to customer. β’ Preparing project status report in MS Excel. β’ Security events monitoring. β’ Monitoring & Analysis of Alerts generated by the Intrusion Detection System on FortiAnalyzer Console, SIEM Solutions (SPLUNK). β’ Reporting Suspicious and Malicious events to the concern departments in preparing defensive action against the fraudulent hosts. β’ Categorizing vulnerabilities based upon the severities into different groups and ensuring the remediation with suggested solutions. β’ Working in SOC team. Monitoring of SOC events, detecting and preventing the Intrusion attempts. β’ Adhoc report for various event sources customized reports and scheduled reports as per requirements. β’ Collecting the logs of all the network devices and analyze the logs to find the suspicious activities. β’ Investigate the security logs, mitigation strategies and responsible for preparing Generic Security incident report. β’ Responsible in preparing the Root cause analysis reports based on the analysis. β’ Performing Log analysis &analyzing the crucial alerts at immediate basis. β’ Monitoring real-time events using SPLUNK. β’ Monitoring, analyzing and responding to infrastructure threats and vulnerabilities. β’ Preparing documents & templates for escalations. β’ Filling the Daily health checklist. β’ Preparing reports as per client request, preparing Knowledge base & use cases. β’ Perform analysis and corrective action for alerts that have not been reported by SOC within agreed SLA β’ Review and submit the Daily Operations Status report to the Lead β’ Review and prepare Standard Operating Procedures (SOP) for the customers. β’ Review of new reports/alerts added. β’ Review and upload the SOC shift handover report sheet PAST WORK EXPERIENCE
Worked in HSBC as an Information Security Analyst - Hyderabad in Global Cyber Security Operations from October 2014 β Dec 2017
Job Profile.
Threat and Incident Management includes log monitoring (SIEM) - violation and administration activity log monitoring services and Threat and Incident Management services - analysing various internal and external security threats, identify and mitigate them.
Network Security and Administration: β’ Monitoring & Analysis of Alerts generated by the Intrusion Detection System on Site Protector Console & SIEM Solutions(SPLUNK) β’ Reporting Suspicious and Malicious events to the concern departments in preparing defensive action against the fraudulent hosts. β’ Reporting to senior management on security vulnerabilities found in IDS.
IDS/IPS Analysis: β’ Proactively identifying malicious websites from IDS events generated in a given day and also blocking the malicious website on proxies to prevent further download of the virus if any user accessed. β’ All websites were tested in VMware player, which is a PC maintained off the network which will avoid downloading malware/virus on the company's network. β’ All the malware samples (Zero-day attack) those are identified will be submitted to McAfee platinum site for latest DAT signatures. β’ Monitoring Network events against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files and malware. Anti-virus Management β’ Monitor centralized pattern distribution (live update) identify and report for deficiencies (desktop and server). β’ Monitor security virus events, respond and provide mitigation/remediation on virus incidents β’ Ensure Updates/Signatures are latest. β’ Analyse and identify the source of infection and provide remedial action against that system β’ Alert and notify respective Teams (Internal teams, vendors, Business Partners (Global) if any abnormal activity is noticed and Coordinate/Work with them in analysing, containing and eradicating the incident β’ Monitoring various security advisories & vendor alerts, Notify teams of any security alerts that may affect them β’ Creating SOP for new medium and critical Virus and posting it on the common portal / repository β’ Report all viruses and worms detected on the network on a daily basis or at mutually agreed frequency β’ Assist in remediation for all viruses, worms, Trojans, Malware, etc. by closely working with Armstrong IT team and CSIRT (Computer Security Incident Response Team) to provide RCA. β’ Provide assistance and support to virus reduction initiatives.
Phish Handling: β’ Taking fraudulent websites (phishing websites) down reported internally or by the customers. β’ investigate all Phishing attack events against HSBC US, Canada, UK or against HSBC group and ensure that appropriate groups are notified β’ Document Phish for further investigations.
Worked in Identity and access management team from August 2010 - October 2014 into Access Management.
Responsibilities as Identity & Access management Analyst:
β’ Creating and managing Windows user accounts and profiling them using required template, Application groups, Shared folder access across 2 different regions in different locations spread over the US and Canada. β’ After making the proper authentication based on e-mails, Incidents CA application (GSD R.12) and Pega tool ( GSR's ) proceed in creations β’ Creation of User Accounts on AD (Active Directory / User Manager) for HNAH Domain and creating home folders for the users locating the correct Server, grant Home folder permissions. β’ Hands on Experience on User Manager & Microsoft AD console β’ Creation\Deletion\Moving of AD accounts with in the domain β’ Deletion of Active directory accounts\Internet\Remote Lotus Notes account as per the Exit Procedures from the HR team. β’ Working on Citrix (E.S.S) i.e. enterprise security station console for creating database accounts. β’ Involved in providing User support for the GAMR Recertification & Transfers Based Recertification through Troubleshooting, Providing Resolution, β’ Revalidation of the access to systems and applications of the users whether they hold the proper access or not with proper approvals.
I hereby declare all the information presented above is true to the best of my knowledge. I assure you to meet up to your expectations if given an opportunity.
===============================================================================================
Information security professional with 4.5 years of experience specializing in network and security management. Can manageIT downside risks arising from security conflicts. My greatest strengths are understanding business risks to enable deployment of efficient security systems. Enthusiastic to take exciting opportunities in a dynamic environment to further both my passion and organizationβs interest
Professional Experience β 3.5 yearsof experience across SIEM tools, Intrusion Prevention System, vulnerabilities and remediation, Anti malware and firewall. β Familiarity with cyber security regulations, including cyber security standards and implementing best practices. β Skilled in dealing with queries, reports, filters, and active channels in ArcSight. β Well versed in using SQL queries for fetching logs from ArcSight Logger. Proven success in conducting IT and cyber security analysis, writing reports, reviewingfindings&recommending it to Information security manager and stakeholders. β Agile in investigating security threats such as Malware Outbreaks, DDOS, OWASP T-10 and Brute force attack on the network. β Intellectual in Analyzing cyber security system needs, evaluating end-user requirements, custom designing solutions and troubleshooting for complex cyber security systems management. PERSISTENT SYSTEMS,INFORMATION SECURITY ANALYST (Sept 2016 to Till Date) β SOC responsibilities β Handling tickets and dispatching within Security operation. β Performing regular health checks as per the standard procedure. β Creating incidents for Security Operation. β Providing 24x7 event monitoring and analysis support for proactive trend analysis ofevents β Hands on experience in Q Radar and Arc sight. β Providing timely reports to the stake holders β Performing regular health checks for Source fire, Juniper, Palo Alto, Check Point and Websense as per the SOP. β Providing access and troubleshooting of Two Factor Authentication issue within Symantec VIP. β Validating issue and revoke certificates request as per the client request from DigiCert portal. β Monitoring Spam email mailbox and Arc sight for various clients. β Experienced in log management focusing on simple collection and storage of log messages and audit trails. Alert identification and log verification via Arc sight console and verification of IP reputation, user legitimacy and so on. β Experienced in client communication on potential threats and suitable recommendations. Fetching timely reports from the arc sight console and updating to customer. β Co-ordinate with business units to determine continuity requirements. Co-ordinate with internal teams such as windows, firewall to eradicate the threat. β Experienced in creating active channels, applying filter, creating filter in the Arc sight Console. Maintained 100% response SLA throughout my time in my experience. Experienced in managing cloud SOC and On-Site SOC. β Ensuring timely updates to customer on the Interaction & Incident booked. β Maintaining customer relationship, ensure customer responsiveness, improve the customer satisfaction. β Handling repeated problems for permanent fix by coordinating with problem management team. β Resolving and analyzing RCA (Root Cause Analysis) for incident reported to the organization.
Project: Monitoring System Perform 09/2015 to 08/2016 Role: System Administration Responsibilities: β’ Helped standardize and implement the scheduled maintenance plan documentation process. β’ Monitored system performance and diagnosed software/hardware problems. β’ Document and track issues via a ticketing system. β’ Ensured full and incremental data backups were successful. β’ Performed data restore for users as needed. β’ Responsible for applying security updates and patches on servers, desktops, and laptops. β’ Configured, troubleshot, and maintained Windows 2003 and 2008 Servers.
==================================================================================== CAREER OBJECTIVES
To be an integral part of a professional Information Security team for applying my knowledge and Professional skills to add value to the organizationβs business and also achieve the corporate objectives whilst getting valued exposure and professional satisfaction along with personal growth.
SOC ANALYST 3.2 years of information security experience in Capgemini Technologies Private Limited from January 2017 to till date. Seeking challenging and rewarding positions across IT Security.
PROFESSIONAL EXPERIENCE
β’ 3.2 Yrs experience working in Security Operations Center (SOC). β’ Security event monitoring using splunk ES and Arc sight ESM . β’ Analyzing each alerts on various platform triggered from SIEM solution. β’ Analyzing Firewall events. β’ Analyzing phishing and spam emails. β’ Working on Syxsense and Canary alerts β’ Working on Bitsight reports β’ Scanning the global and AWS servers. β’ Adding and removing new devices in Sites. β’ Creating Sites and Assets. β’ Working on Fireeye, Forcepoint , F5 WAF and Symantec Antivirus. β’ Preparing metrics weekly report. β’ Checking health status for all devices in ESM β’ Ad hoc scans as per client requirement. β’ Worked on PCI DSS compliance audit as per every quarter audit. β’ Good experience in proof point Email protection tool and Cisco web proxy. β’ Experience in malware analysis like Ransomware infections. β’ Creating new SOPs for the team for new incidents β’ Have Experience and understanding on Splunk, Arc Sight SIEM, Rapid7(Nexpose). β’ Blocking malicious domains in proxy. β’ Monitoring the IDS/IPS logs in ESM. β’ Ability to identify risks, threats and conduct detailed analysis β’ Analyzing daily, weekly and monthly reports. β’ Creating the tickets in ticketing tool. β’ Finding false positive, fine tuning and escalating Security events. β’ Working on Recent threats and Recent Vulnerabilities.
PROFESSIONAL EXPERIENCE
Project Name: Security Monitoring & operations Client: Capgemini Technologies Technologies: SIEM(Splunk,Arcsight), Rapid7(Nexpose),Bitsight, Syxsense, Canary, Malware analysis, Phishing emails,. Role: Security Analyst
PROJECT DESCRIPTION: Working on Corporate Security and Information Security to process of identifying Vulnerbilites, monitoring, recording and analyzing security events or incidents within a real-time IT environment. It provides a comprehensive and centralized view of the security scenario of an IT infrastructure.
ROLES AND RESPONSIBILITIES:
β’ Managing, monitoring events the active channels and dashboards. β’ Working on Fireeye, Forcepoint, F5 WAF and Symantec Antivirus. β’ Finding false positive, fine tuning and escalating Security events. β’ Hands-on experience Monitoring an Arc Sight SIEM and Rapid 7 tool. β’ Creating reports as per client requirement. β’ Analyzing daily, weekly and monthly reports. β’ Analyzing phishing and spam emails. β’ Working on Syxsense and Canary alerts β’ Working on Bitsight reports β’ Scanning the global and AWS servers. β’ Adding and removing new devices in Sites. β’ Creating Sites and Assets. β’ Creating the tickets in ticketing tool.
PROJECT 2:
Project Name: Web Application Client: Capgemini Technologies Technologies: HTML5, Pug.JS, Jade, CSS3, SASS, SCSS, Bootstrap4 Role: Frontend Developer
Responsibilities:
β’ Developed responsive design Single Page Application (SPA). β’ Maintain and improve website β’ Strong engineering design and development skills. β’ Analytical, problem solving and communicational skills. β’ Competency(jQuery, JavaScript,Angular2 ,HTML,CSS) β’ Motivated team player with ability to work under minimal supervision possessing strong β’ Ability to learn new technologies with result-oriented performance. β’ Demonstrates flexibility in day-to-day work.
EDUCATIONAL QUALIFICATION
β’ B.Tech from JNTUK University.
β’ Declaration: I hardly declare that the above-mentioned information is correct up to my knowledge and I bear the responsibility for the correctness of the above-mentioned particulars.