SIEM
Seeking a full-time position that offers professional challenges and allows for the utilization of interpersonal skills, effective time management, and problem-solving expertise. Passionate about contributing to a dynamic team environment and making a positive impact on organizational goals. Dedicated to continuous learning and growth to excel in any role. Eager to apply a diverse skill set and drive for success to add value to a forward-thinking company.
• Assist as an expert in IR, Malware analysis and Digital Forensics artefacts.
• Perform complex incident response technical investigation and develop technical conclusions based on the
examination of the root cause of evidence; review analysis and conclusions of team member consultants.
• Document verdicts, and develop IR remediation recommendations by representing verbally and in written reports
to executives.
• Conduct intramural assessments of incidents, designing and delivering IR action to assist internal IR plans.
• Assessment of reverse-engineering methods.
• Digital forensic inspections, investigations and examinations on Windows, Linux, Cloud and macOS-based
systems.
• Malware Analysis dynamic as well as static.
• Threat hunting by performing deep-level analysis by correlating different feeds.
• Incidents Response investigations on day-to-day tasks.
• Team member of VAPT team to optimize infrastructure security vulnerability assessment.
• Infra Object Pen testing with Kali & Parrot Security’s tool.
• Mobile/Web app Penetration testing as per new modification.
• Network Vulnerability Assessment and generate reports with a resolution of the vulnerability as per the
environment.
• Risk Assessment on infrastructure and take steps to minimize the risk factor.
• Use cases development and fine-tune SIEM rules accordingly
• Investigate network & systems events on L2/L3 level on daily basis.
• Familiarity with forensic artifacts typically found on Windows and Linux operating
systems
• Threat hunting proactive /Post-Active by using Recorded future and Carbon black
threat feeds.
• Identify and manage information security risks to achieve business objectives.
Perform information security risk assessments and serves as an internal auditor for
security issues.
Develop, document, maintain and oversee compliance with IT Policies & Procedures to
improve Information Security Management System (ISMS).
Work with key senior managers responsible for workflow.
• Develop SOPs after incident response handling and mitigating risk.
Accomplishment:
• Created threat advisories by reverse engineering malware samples and finding IOCs and kill switches.
• Performed IR activity and actively looked for the infected machines on the Shamoon, WannaCry Ransomware
outbreak.
• Root analysis has been performed and found kill switches and Created watch lists and rules for Shamoon,
WannaCry and Petya Ransomware for multiple clients. Contained and performed
Deployed IT infrastructure (Domain & Network) as a technical specialist and set up for security.
• Manage/Implement Endpoint Detection and Response like (Cisco AMP-Firewalls, Carbon Black, Titanium)
• Monitoring Sniffer traces and Interpretation using Wireshark.
• Log analysis of OS, network, applications and security technologies.
• Perform basic malware analysis
• Develop monitoring and IR documentation
• Perform vulnerability assessment of servers and applications
• Security events monitoring using SIEM: Splunk, Dell SecureWorks and ArcSight.
• Performed Incident response activities.
Uptime of running Network of more than 2500 ports of CISCO Switching (series 2900,2950 & 3550) for
Brain METRO Network.
Configuration & maintenance of Cisco ASA 5500 series, Firepower & Routers 2800,3600 & 7600 series.
Configuration of protocols IGP & EGP.
The configuration of the site-to-site VPN, MPLS VPN, DM & easy VPN in multiple projects.
Monitor NMS, Monitor Metro Switch & Router.
Evaluate the current network topology and identify specific initiatives to pursue in support of the strategic
network architecture.
Keep the servers & network devices in running position.
Monitor Mail & other core servers, Monitor Logs of mail servers.
To configure/manage/monitor all the network/System devices such as PCs/Laptops, routers and switches.
Worked on Cisco 2960, 3550, 3560, series Switches and 2800, 2900, 3600, and 3800 series Routers.
Perform a backup/restore of configurations of Systems, Switches and Routers.
Cisco/Microsoft professional certifications complete training from CORVIT Systems, the job focused on
learning how databases and corporate IT flow affect the overall corporate environment and tasks.
Responsible for IT network/infrastructure management including network/systems performance tuning
and security monitoring.
Responsible for Network/System integration with the Web Server and Data Base Server.
Friendly, positive attitude
OSCP
SIEM
Incident Response
Digital Forensics
Reverse Engineering
Endpoint Detections
Compromise Assessment
Penetration Testing
OSINT
Offensive & Defensive Teaming
New Technology Adaptive
Social Media Intelligence
Dark Web Investigations
Metadata Analysis
Geospatial Intelligence
OSINT Tools
Automation Scripting & Blockchain Analysis
Anti-Forensics Techniques & Malware Analysis
Memory, Mobile, Disk & Network Forensics
Malware Analysis & Memory Forensics
OSCP
GCFA
OSINT
CCISO
ECDFP
CHFI
PCNSE
CEH
CCIE SEC
RHCE
MCSE