Experienced professional with over 8+ years of expertise as an IT Security Professional in IT Infrastructure, SOC, Information Security, and Cyber Security.
Skilled in scripting for automation and monitoring using Shell and Python scripts.
Demonstrated success in developing and deploying effective countermeasures such as Yara, Snort, and SIEM Correlation Rules.
Proven ability to provide immediate onsite and remote support for digital forensics, working closely with incident response teams to collect evidence.
Known for building positive relationships with other business and IT functions involved in security and privacy matters.
Extensive background in digital forensics research, malware analysis, and cyber threat intelligence. Previous experience working in a Security Operations Centre, specializing in Endpoint Detection & Response (EDR) products.
Responsible for daily CrowdStrike tasks including assessing alerts within the CrowdStrike console. Proficient in designing, configuring, testing, commissioning, securing, and supporting distributed networks related to Supervisory Control and Data Acquisition (SCADA) Systems.
Skilled in reviewing and designing control system architecture from a cybersecurity perspective. Well-versed in Windows, Linux, vulnerability assessment tools, firewalls, IDS/IPS, Nessus, Nmap, SIEM (Splunk, ArcSight), Rapid7, routers, switches, LAN/WAN, TCP/IP protocols, VMware, Endpoint Security, and Cloud Security. Designed and implemented management of Rapid7 InsightVM and Nexpose suites for vulnerability management of servers and desktops.
Provided guidance in planning data migration to O Cybersecurity professional with a thorough understanding of threat landscapes and defensive measures. Recognized for the ability to quickly identify security breaches and implement timely solutions. Highly collaborative individual known for working effectively within teams and adapting to evolving security challenges. Brings strong analytical and problem-solving skills to the table. Experienced in monitoring and analyzing security events to protect organizational assets. Utilizes strong analytical skills to identify threats and vulnerabilities. Possesses knowledge of cybersecurity protocols and effective incident response techniques to ensure a robust defense against potential breaches.Cybersecurity professional with thorough understanding of threat landscapes and defensive measures. Recognized for ability to quickly identify security breaches and implement timely solutions. Highly collaborative, known for working effectively within teams and adapting to evolving security challenges, bringing strong analytical and problem-solving skills to table.
Experienced with monitoring and analyzing security events to protect organizational assets. Utilizes strong analytical skills to identify threats and vulnerabilities. Knowledge of cybersecurity protocols and effective incident response techniques, ensuring robust defense against potential breaches.
Professional with strong background in cybersecurity, skilled in threat detection, incident response, and vulnerability management. Known for effective team collaboration, adaptability in dynamic environments, and results-driven approach. Equipped with expertise in network monitoring, risk assessment, and security protocols, ensuring reliable protection and mitigation strategies.
Recognized for analytical thinking, problem-solving abilities, and unwavering focus on achieving organizational goals.Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals.
Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.Results-driven IT professional with notable success in planning, analysis and implementation of security initiatives. Strengths in providing comprehensive network design and security frameworks.
Overview
8
8
years of professional experience
Work History
Sr. SOC Analyst
Comcast
04.2023 - 01.2025
Ensure the SOC analyst team is providing excellent customer service and support
Evaluate next-gen (EDR) endpoint detection and response software
Implementation of enterprise-wide Cyber Security Risk Management Program based on FISMA and NIST 800 Standards for Information Technology and Industrial Control Systems
Regularly evaluate internal/external technical security controls reviews, perform IT audit/risk advisory services for existing or prospective IT systems, technology, applications, medical and IT devices
Perform Risk Assessments for current and/or previously engaged 3rd Party vendors, providing risk recommendations and mitigation based on regulatory compliance guidelines
Support and maintain Thycotic Secret server
Analyzed, Administered, and Configured Arc Sight SIEM, McAfee ePO, Carbon Black.Implement, configure, and maintain security solutions, DLP, antivirus, vulnerability scanners, IPS/IDS, web filters, VPN, SIEM, SOAR, etc
Perform daily security systems monitoring, verifying the integrity and availability of all systems and key processes
Worked with our infrastructure team to deploy the CrowdStrike agent to all assets
Created IR plan and documentation
Conduct Digital Forensics research, Malware Analysis, Cyber Threat Intelligence
Deployed Proofpoint Email Security, Fraud Protection, and Prevention
Experience with email security standard implementation policies such as SPF, DMIK and DMARC
Address/Monitor IAM mailbox and troubleshoot day-to-day issues sent via email from customers and tickets in ServiceNow
Collaborates with Infrastructure technical teams to resolve complex IAM security related issues
Participate in SCADA RFP process for new application as Network and security evaluator
Research, Test and provide Office 365 user licensing assignment solution using AD and Azure security groups
Workloads include Exchange Online, SharePoint, Skype and Intune
Migration of Exchange in hybrid configuration to Office 365 Exchange Online
Review, configure, and optimize Office 365 Azure Identity Protection functionality
Perform incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts
Monitor critical infrastructure including firewalls, IDS/IPS devices, virtual networks, vulnerability scanners, VPNs, WANs, and disaster recovery sites
Investigated alerts created by IDS/IPS including malicious file uploads compromised servers, SQL-injections, and port scanning
Managed vulnerabilities with the aid of NESSUS, Web Inspect as vulnerability scanning tools to detect potential risk on single or multiple assets across the enterprise
Conducted Security Scans using Security Center (NESSUS) to identify System Vulnerability, risk assessment and technical report submission detailing the vulnerabilities, risk, and remediation action and review assessment results
Conducts Threat Hunting using Crowdstrike
Evaluate next-gen (EDR) endpoint detection and response software
Utilize Crowdstrike to investigate and analyze malware on endpoint computers and perform network containment of the asset in addition to remotely uninstalling malicious files
Analyzed threats to corporate networks by utilizing SIEM products (Arcsight and LogRhythm) to assess the impact on client environments
Performs network/ host-based intrusion detection using a variety of threat detection tools such as Splunk, Proofpoint Sourcefire, FireEye (HX, NX)
Configuring log generation and collection from a wide variety of products distributed across categories of servers, network devices, security devices, databases, and apps
IDS/IPS monitoring/analysis with tools such as Sourcefire, Snort, Bluecoat, Palo Alto, McAfee and FireEye
Handle and investigate WAF alerts for Source fire and Fire eye
Perform analysis on security incidents using Splunk, Tanium, Windows Event and Symantec logs
Monitored and analyzed Intrusion Detection Systems (IDS) to identify security issues for remediation
Perform cyber threat intelligence analysis, correlate actionable security events, perform network traffic analysis using raw packet data, net flow, IDS, IPS and custom sensor output as it pertains to the cyber security of communications networks, and participate in the coordination of resources during incident
Implemented and Maintained SIEM infrastructure using QRadar and Splunk in AWS environment
Installed and configured Confidential QRadar Network Insights appliance to enables attack prediction through real-time network traffic analysis
Participated in the product selection and installation of QRadar Security Information Event Manager SIEM consisting of multiple collectors
Maintained accurate documentation of all SOC activities, facilitating knowledge sharing across the organization.
Collaborated with IT teams to implement effective security measures, safeguarding critical data and systems.
Enhanced network security by monitoring systems for potential threats and vulnerabilities.
Reduced false alarms by fine-tuning intrusion detection system configurations based on historical analysis of incidents.
Improved incident management workflows through streamlined communication between SOC Analysts, IT departments, and other relevant parties.
Trained junior analysts in threat intelligence gathering techniques, improving overall team efficiency.
Identified root causes of security breaches through thorough investigation and analysis of log data.
Conducted comprehensive security assessments to identify risks and recommend mitigation strategies.
Streamlined incident response processes for quicker threat detection and remediation.
Implemented automated tools for continuous monitoring of system logs, reducing manual efforts by the team.
Evaluated new cybersecurity solutions through rigorous testing procedures, recommending the most appropriate technologies based on specific requirements and budget constraints.
Led cybersecurity awareness programs, increasing staff vigilance against phishing and social engineering attacks.
Played key role in selection and deployment of cybersecurity software, enhancing overall network defense capabilities.
Collaborated with IT department to ensure seamless application of security policies across all technology platforms.
Recommend improvements in security systems and procedures.
Conducted security audits to identify vulnerabilities.
Updated security procedures and documentation, keeping pace with evolving cyber threats and industry best practices.
Performed risk analyses to identify appropriate security countermeasures.
Information Security Analyst
Infoblox
07.2022 - 04.2023
Monitoring logRhythm dashboard for the suspicious alerts and provide efficient write-up for each alert
Using tools like LogRhythm in analyzing network, DLP email monitoring, Symantec SEP logs, firewall and proxy logs to determine the risk level of the alarms
Delivering comprehensive prevention, detection and response status using FireEye, Symantec, and Qualys software
Utilized Tanium for Deployments, monitor, and analyze data throughout various networks
Administer Controls & Permissions to files using PowerShell commands through SCCM
Performing periodic vulnerability testing and assisting in remediation efforts
Identified, documented and investigated suspicious events in intrusion detection systems (IDS) and SIEM tools
Monitoring and analyzing network traffic, Intrusion Detection Systems (IDS) and Instruction Prevention Systems (IPS), security events and logs
Involved in firewall deployment and management in Azure such as Palo Alto, Azure Firewall
Worked in Security Incident and Event Monitoring SIEM platform Confidential QRadar, and Splunk
Provide proactive APT hunting, incident response support, and advanced analytic capabilities
Run vulnerability scans and reviews vulnerability assessment reports
Responsible to establish the tool capability for security assessments and conduct the compliance and vulnerability assessments for infrastructure servers and devices using Qualys Guard on a periodic basis
Experience in preparations for ISO27001 surveillance audit and internal audits and working with the divisions in gathering the evidences required for the external audit
Interpret FERC and NERC regulations for integration into plant DCS/IDS control systems, focusing on best practices and operational cost effectiveness
Responsible to coordinate with various stakeholder to discuss vulnerabilities through recommending and monitoring of remediation activities
Provides direct support of Symantec Network and Endpoint DLP systems including Linux based Symantec Enforce, Defender, Discover and Monitor servers as well as their Oracle support database server
Provide operational engineering support for Symantec Endpoint DLP clients deployed throughout the client enterprise and network monitoring/DLP monitoring systems including assisting in issue resolution, implementing DLP system/client upgrades and working with support groups to resolve conflicts between DLP and other protection mechanisms
Interpret and respond to issues related to DLP activity including integrating with alerting systems, adjusting policies to support customer DLP requirements, support the customers regular and adhoc reporting requirements
Build and maintain security dashboards, metrics and KPI's based on business needs and requirements
Research threats and vulnerabilities and, where appropriate, take action to mitigate threats and remediate vulnerabilities
Review, assess, and mitigate penetration tests and vulnerability assessments on information systems and infrastructure
Monitor security vulnerability information from vendors and third parties
Coordinate with other organizations, both internal (CSIRT/SOC), and manufacturer support (Symantec); assist with advanced issue resolution across the enterprise
Conducted security audits to identify vulnerabilities.
Analyzed network traffic and system logs to detect malicious activities.
Conducted internal audits to identify areas of improvement within the organization''s information security program.
Strengthened network security by conducting regular risk assessments and implementing appropriate countermeasures.
Assessed vendor security during procurement processes, ensuring compliance with company policies and industry best practices.
Boosted cybersecurity awareness among employees through effective training sessions and workshops.
Increased organizational resilience with the development of comprehensive disaster recovery plans.
Streamlined threat monitoring processes for quicker identification of potential risks.
Enhanced system protection by designing and deploying intrusion detection systems.
Participated in industry conferences to stay current with cybersecurity trends while networking with peers from various organizations.
Provided expert guidance in the selection and implementation of security tools, including firewalls, antivirus software, and encryption solutions.
Educated employees on cybersecurity awareness through well-structured training programs and workshops.
Championed a culture of continuous improvement by regularly reviewing and updating information security policies to reflect evolving threat landscapes.
Reduced company risk by conducting thorough vulnerability assessments and recommending appropriate remediation strategies.
Developed custom scripts for automation of routine tasks, increasing efficiency in detecting and responding to threats.
Coordinated disaster recovery efforts during high-profile cyber attacks to minimize downtime and restore business operations promptly.
Conducted regular audits to ensure compliance with industry standards, such as HIPAA, GDPR, and PCI DSS.
Developed plans to safeguard computer files against modification, destruction, or disclosure.
Performed risk analyses to identify appropriate security countermeasures.
Encrypted data and erected firewalls to protect confidential information.
L2 SOC Engineer
Sacred Heart University
01.2022 - 07.2022
Provided leadership in architecture and implementing security solutions towards Qualys and SIEM tools like QRadar, Splunk
Implemented ArcSight Logger within organization's syslog enclave for long-term data retention and analysis (SIEM)
Developed Vulnerability Scanning process for all environment builds, and on-going monthly scanning reporting using Nessus
Responsibilities includes supporting 24/7 SOC environment to ensure real time information security and prevent any cyber-attack from inside and outside network
Perform manual security testing for OWASP Top 10 vulnerabilities like SQL Injection attacks, cross site scripting (XSS), CSRF, Session Management etc
Automate deployment of server level security tools - Tennable, Nessus, Crowdstrike
Develop and deploy effective countermeasures (Yara, Snort, SIEM Correlation Rules)
Working with red team in SOC to apply security awareness to Cyber Kill Chain management as well as using moving target defense approach
Use Various networking troubleshooting tools such as MTR, traceroute, tcpdump, Wireshark and iperf to troubleshoot performance and connectivity issues
Support Panorama Centralized Management for Palo alto firewall PA-500, PA-200 and PA3060, to central manage the console, configure, maintain, monitor, and update firewall core, as well as back up configuration
Performing firewall optimization using Tufin by removing unused rule, duplicate objects, fully shadowed rules, and disabled rules
Configuring rules and maintaining Palo Alto firewalls and analysis of firewall logs using various tools
Created S3 buckets in the AWS environment to store files, sometimes which are required to serve static content
Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
Implementing firewall rules and configuring Palo Alto Network Firewall
Dashboard / Enterprise dashboard customization for various teams based on the log source type requirements
Experienced in Operations Center environment team such as: Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT)
Assist in preparing documentation for the Implement the Risk Management Framework (RMF) in accordance to NIST SP
Implementation and management of email public security methods, DKIM, SPF, DMARC records
Involved in Security Operation, Vulnerability and Risk Assessment, alerting report generation and analysis with various security tools (Splunk, McAfee ePO, Symantec DLP, Bluecoat Proxy)
Performed threat hunting, Incident Response (IR) using Carbon Black Endpoint Detection and Response (EDR)
Developed correlation rules and conducted incident analysis using Splunk ES and Exabeam UBA, UEBA
Managed Crowdstrike and EDR
Implementing High Availability both Active/Passive and Active/Active using NSRP in Juniper firewalls
Implementation of High Availability by creating the HA zones for Netscreen firewalls using NSRP and also supporting the cluster pairs
Conduct threat intelligence analysis on key areas of the Enterprise Defense in depth analytics, incident statistics and other relevant information in the creation of periodic threat intelligence reports
Experienced with DLP, Proofpoint, Trend Micro and Splunk Enterprise SIEM security tools to monitor network environment
Supported customer integration efforts by addressing reported issues promptly and providing technical guidance as needed.
Achieved successful tape-out of multiple SoC projects by collaborating with cross-functional teams, including design, verification, and physical implementation groups.
Mentored junior engineers on best practices in SoC design and troubleshooting techniques for efficient problemsolving.
Contributed to the development of advanced digital signal processing algorithms for high-performance SoCs used in telecommunications applications.
Leveraged advanced low-power design techniques to optimize energy efficiency while maintaining high-performance targets across a variety of applications.
Conducted thorough post-silicon validation to ensure that fabricated chips met stringent quality standards before releasing them to customers.
Enhanced design quality by performing extensive verification and validation of complex SoC designs.
Developed custom scripts for automating SoC design tasks, increasing efficiency and reducing manual errors in the process.
Improved SoC performance by optimizing power, area, and timing through synthesis and place-and-route techniques.
Provided technical leadership during critical project phases, such as tape-out and post-silicon validation, ensuring successful outcomes for complex SoC designs.
Developed efficient testbenches for functional verification, enabling thorough evaluation of SoC designs prior to tapeout.
Participated actively in architectural discussions leading up to the creation of comprehensive specifications for next-generation system-on-chip products.
Optimized RTL code for better synthesis results, resulting in improved area utilization and reduced gate count.
Resolved critical layout issues during physical implementation, ensuring optimal performance of final silicon devices.
Collaborated with analog designers to integrate mixed-signal IP blocks into full-custom SoC designs effectively.
Established effective communication channels between hardware and software teams to facilitate seamless integration of firmware onto custom-designed chips.
Applied cutting-edge EDA tools and methodologies during all stages of the design process to ensure timely completion of large-scale projects.
Implemented robust power management strategies to reduce overall power consumption in complex SoCs.
Addressed design challenges and evaluated alternative design models to meet project requirements.
Liaised with stakeholders to define and document design requirements.
Led product testing, failure investigations and corrective action planning.
Recommended repair or design modifications of electronics components or systems based on factors such as environment, service or system capabilities.
Developed adaptive systems that flex to meet wide range of requests.
Analyzed electronics system requirements, capacity or customer needs to determine project feasibility.
Oversaw complete life cycle of design, from initial concepts through production support.
Completed calculations and design simulations to assess power needs and choose optimal components.
SOC Analyst
CSS Corp Private Ltd
08.2019 - 11.2021
Maintained accurate documentation of all SOC activities, facilitating knowledge sharing across the organization.
Collaborated with IT teams to implement effective security measures, safeguarding critical data and systems.
Enhanced network security by monitoring systems for potential threats and vulnerabilities.
Reduced false alarms by fine-tuning intrusion detection system configurations based on historical analysis of incidents.
Improved incident management workflows through streamlined communication between SOC Analysts, IT departments, and other relevant parties.
Monitor the security of network systems for security breaches and Incidents. Monitor changes to highly sensitive computer security controls to ensure appropriate system administrative actions,investigate and remediate. Prepare detailed reports pertaining to incidents and/or malicious damage, extent of the damage and remediated actions taken.
Trained junior analysts in threat intelligence gathering techniques, improving overall team efficiency.
Identified root causes of security breaches through thorough investigation and analysis of log data.
Streamlined incident response processes for quicker threat detection and remediation.
Conducted comprehensive security assessments to identify risks and recommend mitigation strategies.
Evaluated new cybersecurity solutions through rigorous testing procedures, recommending the most appropriate technologies based on specific requirements and budget constraints.
Promoted a culture of security awareness through regular training sessions, presentations, and workshops for employees at all levels.
Supported compliance initiatives by conducting regular audits of security controls and providing recommendations for improvement.
Provided expert guidance on cybersecurity trends and emerging threats to internal stakeholders for informed decisionmaking.
Implemented automated tools for continuous monitoring of system logs, reducing manual efforts by the team.
Provided technical support during high-priority incidents, ensuring timely resolution with minimal impact on business operations.
Reduced false positive alerts, fine-tuning security monitoring tools based on detailed analysis.
Conducted in-depth analysis of security breaches to determine their root causes and prevent future incidents.
Initiated regular penetration testing to evaluate effectiveness of security measures.
Guided junior analysts in investigation of complex security incidents, fostering culture of learning and development.
Led cybersecurity awareness programs, increasing staff vigilance against phishing and social engineering attacks.
Facilitated cross-departmental collaboration efforts to develop unified security protocols.
Enhanced team knowledge with regular training sessions on latest cybersecurity trends and threats.
Coordinated with external security vendors to enhance threat intelligence and defense mechanisms.
Performed risk analyses to identify appropriate security countermeasures.
Collaborated with IT teams to integrate security measures into the development and deployment of new applications.
Reduced downtime caused by security incidents by establishing robust incident management and recovery framework.
Developed and enforced stringent cybersecurity policies, significantly reducing risk of data breaches.
Led cybersecurity awareness training sessions, increasing staff vigilance against phishing and social engineering attacks.
Jr SOC Analyst
ValueLabs
06.2017 - 07.2019
Maintained accurate documentation of all SOC activities, facilitating knowledge sharing across the organization.
Collaborated with IT teams to implement effective security measures, safeguarding critical data and systems.
Enhanced network security by monitoring systems for potential threats and vulnerabilities.
Reduced false alarms by fine-tuning intrusion detection system configurations based on historical analysis of incidents.
Improved incident management workflows through streamlined communication between SOC Analysts, IT departments, and other relevant parties.
Trained junior analysts in threat intelligence gathering techniques, improving overall team efficiency.
Conducted comprehensive security assessments to identify risks and recommend mitigation strategies.
Streamlined incident response processes for quicker threat detection and remediation.
Identified root causes of security breaches through thorough investigation and analysis of log data.
Supported compliance initiatives by conducting regular audits of security controls and providing recommendations for improvement.
Provided expert guidance on cybersecurity trends and emerging threats to internal stakeholders for informed decisionmaking.
Provided technical support during high-priority incidents, ensuring timely resolution with minimal impact on business operations.
Implemented automated tools for continuous monitoring of system logs, reducing manual efforts by the team.
Promoted a culture of security awareness through regular training sessions, presentations, and workshops for employees at all levels.
Evaluated new cybersecurity solutions through rigorous testing procedures, recommending the most appropriate technologies based on specific requirements and budget constraints.
Developed comprehensive incident response plans, streamlining process of mitigating cyber attacks.
Coordinated with external security vendors to enhance threat intelligence and defense mechanisms.
Led cybersecurity awareness programs, increasing staff vigilance against phishing and social engineering attacks.
Optimized data protection strategies, ensuring compliance with industry regulations and safeguarding sensitive information.
Improved system security by configuring firewalls and intrusion detection systems.
Enhanced team knowledge with regular training sessions on latest cybersecurity trends and threats.
Initiated regular penetration testing to evaluate effectiveness of security measures.
Played key role in selection and deployment of cybersecurity software, enhancing overall network defense capabilities.
Conducted in-depth analysis of security breaches to determine their root causes and prevent future incidents.
Reduced false positive alerts, fine-tuning security monitoring tools based on detailed analysis.
Facilitated cross-departmental collaboration efforts to develop unified security protocols.
Spearheaded implementation of SIEM solution, enhancing organization's ability to detect and respond to threats.
Analyzed and reported on security trends, providing actionable insights for strategic planning.
Strengthened network security by implementing advanced threat detection systems.
Guided junior analysts in investigation of complex security incidents, fostering culture of learning and development.
Ensured continuous system monitoring, detecting anomalies that could indicate potential security threats.
Collaborated with IT department to ensure seamless application of security policies across all technology platforms.