Summary
Overview
Work History
Education
Skills
Timeline
Generic
Bharath Parupalli

Bharath Parupalli

Philadelphia,PA

Summary

  • Experienced professional with over 8+ years of expertise as an IT Security Professional in IT Infrastructure, SOC, Information Security, and Cyber Security.
  • Skilled in scripting for automation and monitoring using Shell and Python scripts.
  • Demonstrated success in developing and deploying effective countermeasures such as Yara, Snort, and SIEM Correlation Rules.
  • Proven ability to provide immediate onsite and remote support for digital forensics, working closely with incident response teams to collect evidence.
  • Known for building positive relationships with other business and IT functions involved in security and privacy matters.
  • Extensive background in digital forensics research, malware analysis, and cyber threat intelligence. Previous experience working in a Security Operations Centre, specializing in Endpoint Detection & Response (EDR) products.
  • Responsible for daily CrowdStrike tasks including assessing alerts within the CrowdStrike console. Proficient in designing, configuring, testing, commissioning, securing, and supporting distributed networks related to Supervisory Control and Data Acquisition (SCADA) Systems.
  • Skilled in reviewing and designing control system architecture from a cybersecurity perspective. Well-versed in Windows, Linux, vulnerability assessment tools, firewalls, IDS/IPS, Nessus, Nmap, SIEM (Splunk, ArcSight), Rapid7, routers, switches, LAN/WAN, TCP/IP protocols, VMware, Endpoint Security, and Cloud Security. Designed and implemented management of Rapid7 InsightVM and Nexpose suites for vulnerability management of servers and desktops.
  • Provided guidance in planning data migration to O Cybersecurity professional with a thorough understanding of threat landscapes and defensive measures. Recognized for the ability to quickly identify security breaches and implement timely solutions. Highly collaborative individual known for working effectively within teams and adapting to evolving security challenges. Brings strong analytical and problem-solving skills to the table. Experienced in monitoring and analyzing security events to protect organizational assets. Utilizes strong analytical skills to identify threats and vulnerabilities. Possesses knowledge of cybersecurity protocols and effective incident response techniques to ensure a robust defense against potential breaches.Cybersecurity professional with thorough understanding of threat landscapes and defensive measures. Recognized for ability to quickly identify security breaches and implement timely solutions. Highly collaborative, known for working effectively within teams and adapting to evolving security challenges, bringing strong analytical and problem-solving skills to table.
  • Experienced with monitoring and analyzing security events to protect organizational assets. Utilizes strong analytical skills to identify threats and vulnerabilities. Knowledge of cybersecurity protocols and effective incident response techniques, ensuring robust defense against potential breaches.
  • Professional with strong background in cybersecurity, skilled in threat detection, incident response, and vulnerability management. Known for effective team collaboration, adaptability in dynamic environments, and results-driven approach. Equipped with expertise in network monitoring, risk assessment, and security protocols, ensuring reliable protection and mitigation strategies.
  • Recognized for analytical thinking, problem-solving abilities, and unwavering focus on achieving organizational goals.Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals.
  • Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.Results-driven IT professional with notable success in planning, analysis and implementation of security initiatives. Strengths in providing comprehensive network design and security frameworks.

Overview

8
8
years of professional experience

Work History

Sr. SOC Analyst

Comcast
04.2023 - 01.2025
  • Ensure the SOC analyst team is providing excellent customer service and support
  • Evaluate next-gen (EDR) endpoint detection and response software
  • Implementation of enterprise-wide Cyber Security Risk Management Program based on FISMA and NIST 800 Standards for Information Technology and Industrial Control Systems
  • Regularly evaluate internal/external technical security controls reviews, perform IT audit/risk advisory services for existing or prospective IT systems, technology, applications, medical and IT devices
  • Perform Risk Assessments for current and/or previously engaged 3rd Party vendors, providing risk recommendations and mitigation based on regulatory compliance guidelines
  • Support and maintain Thycotic Secret server
  • Analyzed, Administered, and Configured Arc Sight SIEM, McAfee ePO, Carbon Black.Implement, configure, and maintain security solutions, DLP, antivirus, vulnerability scanners, IPS/IDS, web filters, VPN, SIEM, SOAR, etc
  • Perform daily security systems monitoring, verifying the integrity and availability of all systems and key processes
  • Worked with our infrastructure team to deploy the CrowdStrike agent to all assets
  • Created IR plan and documentation
  • Conduct Digital Forensics research, Malware Analysis, Cyber Threat Intelligence
  • Deployed Proofpoint Email Security, Fraud Protection, and Prevention
  • Experience with email security standard implementation policies such as SPF, DMIK and DMARC
  • Address/Monitor IAM mailbox and troubleshoot day-to-day issues sent via email from customers and tickets in ServiceNow
  • Collaborates with Infrastructure technical teams to resolve complex IAM security related issues
  • Participate in SCADA RFP process for new application as Network and security evaluator
  • Research, Test and provide Office 365 user licensing assignment solution using AD and Azure security groups
  • Workloads include Exchange Online, SharePoint, Skype and Intune
  • Migration of Exchange in hybrid configuration to Office 365 Exchange Online
  • Review, configure, and optimize Office 365 Azure Identity Protection functionality
  • Perform incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts
  • Monitor critical infrastructure including firewalls, IDS/IPS devices, virtual networks, vulnerability scanners, VPNs, WANs, and disaster recovery sites
  • Investigated alerts created by IDS/IPS including malicious file uploads compromised servers, SQL-injections, and port scanning
  • Managed vulnerabilities with the aid of NESSUS, Web Inspect as vulnerability scanning tools to detect potential risk on single or multiple assets across the enterprise
  • Conducted Security Scans using Security Center (NESSUS) to identify System Vulnerability, risk assessment and technical report submission detailing the vulnerabilities, risk, and remediation action and review assessment results
  • Conducts Threat Hunting using Crowdstrike
  • Evaluate next-gen (EDR) endpoint detection and response software
  • Utilize Crowdstrike to investigate and analyze malware on endpoint computers and perform network containment of the asset in addition to remotely uninstalling malicious files
  • Analyzed threats to corporate networks by utilizing SIEM products (Arcsight and LogRhythm) to assess the impact on client environments
  • Performs network/ host-based intrusion detection using a variety of threat detection tools such as Splunk, Proofpoint Sourcefire, FireEye (HX, NX)
  • Configuring log generation and collection from a wide variety of products distributed across categories of servers, network devices, security devices, databases, and apps
  • IDS/IPS monitoring/analysis with tools such as Sourcefire, Snort, Bluecoat, Palo Alto, McAfee and FireEye
  • Handle and investigate WAF alerts for Source fire and Fire eye
  • Perform analysis on security incidents using Splunk, Tanium, Windows Event and Symantec logs
  • Monitored and analyzed Intrusion Detection Systems (IDS) to identify security issues for remediation
  • Perform cyber threat intelligence analysis, correlate actionable security events, perform network traffic analysis using raw packet data, net flow, IDS, IPS and custom sensor output as it pertains to the cyber security of communications networks, and participate in the coordination of resources during incident
  • Implemented and Maintained SIEM infrastructure using QRadar and Splunk in AWS environment
  • Installed and configured Confidential QRadar Network Insights appliance to enables attack prediction through real-time network traffic analysis
  • Participated in the product selection and installation of QRadar Security Information Event Manager SIEM consisting of multiple collectors
  • Maintained accurate documentation of all SOC activities, facilitating knowledge sharing across the organization.
  • Collaborated with IT teams to implement effective security measures, safeguarding critical data and systems.
  • Enhanced network security by monitoring systems for potential threats and vulnerabilities.
  • Reduced false alarms by fine-tuning intrusion detection system configurations based on historical analysis of incidents.
  • Improved incident management workflows through streamlined communication between SOC Analysts, IT departments, and other relevant parties.
  • Trained junior analysts in threat intelligence gathering techniques, improving overall team efficiency.
  • Identified root causes of security breaches through thorough investigation and analysis of log data.
  • Conducted comprehensive security assessments to identify risks and recommend mitigation strategies.
  • Streamlined incident response processes for quicker threat detection and remediation.
  • Implemented automated tools for continuous monitoring of system logs, reducing manual efforts by the team.
  • Evaluated new cybersecurity solutions through rigorous testing procedures, recommending the most appropriate technologies based on specific requirements and budget constraints.
  • Led cybersecurity awareness programs, increasing staff vigilance against phishing and social engineering attacks.
  • Played key role in selection and deployment of cybersecurity software, enhancing overall network defense capabilities.
  • Collaborated with IT department to ensure seamless application of security policies across all technology platforms.
  • Recommend improvements in security systems and procedures.
  • Conducted security audits to identify vulnerabilities.
  • Monitored real-time security alerts to identify potential threats, significantly reducing incident response times.
  • Updated security procedures and documentation, keeping pace with evolving cyber threats and industry best practices.
  • Performed risk analyses to identify appropriate security countermeasures.

Information Security Analyst

Infoblox
07.2022 - 04.2023
  • Monitoring logRhythm dashboard for the suspicious alerts and provide efficient write-up for each alert
  • Using tools like LogRhythm in analyzing network, DLP email monitoring, Symantec SEP logs, firewall and proxy logs to determine the risk level of the alarms
  • Delivering comprehensive prevention, detection and response status using FireEye, Symantec, and Qualys software
  • Utilized Tanium for Deployments, monitor, and analyze data throughout various networks
  • Administer Controls & Permissions to files using PowerShell commands through SCCM
  • Performing periodic vulnerability testing and assisting in remediation efforts
  • Identified, documented and investigated suspicious events in intrusion detection systems (IDS) and SIEM tools
  • Monitoring and analyzing network traffic, Intrusion Detection Systems (IDS) and Instruction Prevention Systems (IPS), security events and logs
  • Involved in firewall deployment and management in Azure such as Palo Alto, Azure Firewall
  • Worked in Security Incident and Event Monitoring SIEM platform Confidential QRadar, and Splunk
  • Provide proactive APT hunting, incident response support, and advanced analytic capabilities
  • Run vulnerability scans and reviews vulnerability assessment reports
  • Responsible to establish the tool capability for security assessments and conduct the compliance and vulnerability assessments for infrastructure servers and devices using Qualys Guard on a periodic basis
  • Experience in preparations for ISO27001 surveillance audit and internal audits and working with the divisions in gathering the evidences required for the external audit
  • Prepare NERC CIP V5 documentation ensuring auditable guidelines for PGD Plants
  • Interpret FERC and NERC regulations for integration into plant DCS/IDS control systems, focusing on best practices and operational cost effectiveness
  • Responsible to coordinate with various stakeholder to discuss vulnerabilities through recommending and monitoring of remediation activities
  • Provides direct support of Symantec Network and Endpoint DLP systems including Linux based Symantec Enforce, Defender, Discover and Monitor servers as well as their Oracle support database server
  • Provide operational engineering support for Symantec Endpoint DLP clients deployed throughout the client enterprise and network monitoring/DLP monitoring systems including assisting in issue resolution, implementing DLP system/client upgrades and working with support groups to resolve conflicts between DLP and other protection mechanisms
  • Interpret and respond to issues related to DLP activity including integrating with alerting systems, adjusting policies to support customer DLP requirements, support the customers regular and adhoc reporting requirements
  • Build and maintain security dashboards, metrics and KPI's based on business needs and requirements
  • Research threats and vulnerabilities and, where appropriate, take action to mitigate threats and remediate vulnerabilities
  • Review, assess, and mitigate penetration tests and vulnerability assessments on information systems and infrastructure
  • Monitor security vulnerability information from vendors and third parties
  • Coordinate with other organizations, both internal (CSIRT/SOC), and manufacturer support (Symantec); assist with advanced issue resolution across the enterprise
  • Conducted security audits to identify vulnerabilities.
  • Analyzed network traffic and system logs to detect malicious activities.
  • Conducted internal audits to identify areas of improvement within the organization''s information security program.
  • Strengthened network security by conducting regular risk assessments and implementing appropriate countermeasures.
  • Assessed vendor security during procurement processes, ensuring compliance with company policies and industry best practices.
  • Boosted cybersecurity awareness among employees through effective training sessions and workshops.
  • Increased organizational resilience with the development of comprehensive disaster recovery plans.
  • Streamlined threat monitoring processes for quicker identification of potential risks.
  • Enhanced system protection by designing and deploying intrusion detection systems.
  • Participated in industry conferences to stay current with cybersecurity trends while networking with peers from various organizations.
  • Provided expert guidance in the selection and implementation of security tools, including firewalls, antivirus software, and encryption solutions.
  • Educated employees on cybersecurity awareness through well-structured training programs and workshops.
  • Championed a culture of continuous improvement by regularly reviewing and updating information security policies to reflect evolving threat landscapes.
  • Reduced company risk by conducting thorough vulnerability assessments and recommending appropriate remediation strategies.
  • Developed custom scripts for automation of routine tasks, increasing efficiency in detecting and responding to threats.
  • Coordinated disaster recovery efforts during high-profile cyber attacks to minimize downtime and restore business operations promptly.
  • Conducted regular audits to ensure compliance with industry standards, such as HIPAA, GDPR, and PCI DSS.
  • Developed plans to safeguard computer files against modification, destruction, or disclosure.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Encrypted data and erected firewalls to protect confidential information.

L2 SOC Engineer

Sacred Heart University
01.2022 - 07.2022
  • Provided leadership in architecture and implementing security solutions towards Qualys and SIEM tools like QRadar, Splunk
  • Implemented ArcSight Logger within organization's syslog enclave for long-term data retention and analysis (SIEM)
  • Developed Vulnerability Scanning process for all environment builds, and on-going monthly scanning reporting using Nessus
  • Responsibilities includes supporting 24/7 SOC environment to ensure real time information security and prevent any cyber-attack from inside and outside network
  • Perform manual security testing for OWASP Top 10 vulnerabilities like SQL Injection attacks, cross site scripting (XSS), CSRF, Session Management etc
  • Automate deployment of server level security tools - Tennable, Nessus, Crowdstrike
  • Develop and deploy effective countermeasures (Yara, Snort, SIEM Correlation Rules)
  • Working with red team in SOC to apply security awareness to Cyber Kill Chain management as well as using moving target defense approach
  • Use Various networking troubleshooting tools such as MTR, traceroute, tcpdump, Wireshark and iperf to troubleshoot performance and connectivity issues
  • Support Panorama Centralized Management for Palo alto firewall PA-500, PA-200 and PA3060, to central manage the console, configure, maintain, monitor, and update firewall core, as well as back up configuration
  • Performing firewall optimization using Tufin by removing unused rule, duplicate objects, fully shadowed rules, and disabled rules
  • Configuring rules and maintaining Palo Alto firewalls and analysis of firewall logs using various tools
  • Created S3 buckets in the AWS environment to store files, sometimes which are required to serve static content
  • Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
  • Implementing firewall rules and configuring Palo Alto Network Firewall
  • Dashboard / Enterprise dashboard customization for various teams based on the log source type requirements
  • Experienced in Operations Center environment team such as: Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT)
  • Assist in preparing documentation for the Implement the Risk Management Framework (RMF) in accordance to NIST SP
  • Implementation and management of email public security methods, DKIM, SPF, DMARC records
  • Involved in Security Operation, Vulnerability and Risk Assessment, alerting report generation and analysis with various security tools (Splunk, McAfee ePO, Symantec DLP, Bluecoat Proxy)
  • Performed threat hunting, Incident Response (IR) using Carbon Black Endpoint Detection and Response (EDR)
  • Developed correlation rules and conducted incident analysis using Splunk ES and Exabeam UBA, UEBA
  • Managed Crowdstrike and EDR
  • Implementing High Availability both Active/Passive and Active/Active using NSRP in Juniper firewalls
  • Implementation of High Availability by creating the HA zones for Netscreen firewalls using NSRP and also supporting the cluster pairs
  • Conduct threat intelligence analysis on key areas of the Enterprise Defense in depth analytics, incident statistics and other relevant information in the creation of periodic threat intelligence reports
  • Experienced with DLP, Proofpoint, Trend Micro and Splunk Enterprise SIEM security tools to monitor network environment
  • Supported customer integration efforts by addressing reported issues promptly and providing technical guidance as needed.
  • Achieved successful tape-out of multiple SoC projects by collaborating with cross-functional teams, including design, verification, and physical implementation groups.
  • Mentored junior engineers on best practices in SoC design and troubleshooting techniques for efficient problemsolving.
  • Contributed to the development of advanced digital signal processing algorithms for high-performance SoCs used in telecommunications applications.
  • Leveraged advanced low-power design techniques to optimize energy efficiency while maintaining high-performance targets across a variety of applications.
  • Conducted thorough post-silicon validation to ensure that fabricated chips met stringent quality standards before releasing them to customers.
  • Enhanced design quality by performing extensive verification and validation of complex SoC designs.
  • Developed custom scripts for automating SoC design tasks, increasing efficiency and reducing manual errors in the process.
  • Improved SoC performance by optimizing power, area, and timing through synthesis and place-and-route techniques.
  • Provided technical leadership during critical project phases, such as tape-out and post-silicon validation, ensuring successful outcomes for complex SoC designs.
  • Developed efficient testbenches for functional verification, enabling thorough evaluation of SoC designs prior to tapeout.
  • Participated actively in architectural discussions leading up to the creation of comprehensive specifications for next-generation system-on-chip products.
  • Optimized RTL code for better synthesis results, resulting in improved area utilization and reduced gate count.
  • Resolved critical layout issues during physical implementation, ensuring optimal performance of final silicon devices.
  • Collaborated with analog designers to integrate mixed-signal IP blocks into full-custom SoC designs effectively.
  • Established effective communication channels between hardware and software teams to facilitate seamless integration of firmware onto custom-designed chips.
  • Applied cutting-edge EDA tools and methodologies during all stages of the design process to ensure timely completion of large-scale projects.
  • Implemented robust power management strategies to reduce overall power consumption in complex SoCs.
  • Addressed design challenges and evaluated alternative design models to meet project requirements.
  • Liaised with stakeholders to define and document design requirements.
  • Led product testing, failure investigations and corrective action planning.
  • Recommended repair or design modifications of electronics components or systems based on factors such as environment, service or system capabilities.
  • Developed adaptive systems that flex to meet wide range of requests.
  • Analyzed electronics system requirements, capacity or customer needs to determine project feasibility.
  • Oversaw complete life cycle of design, from initial concepts through production support.
  • Completed calculations and design simulations to assess power needs and choose optimal components.

SOC Analyst

CSS Corp Private Ltd
08.2019 - 11.2021
  • Maintained accurate documentation of all SOC activities, facilitating knowledge sharing across the organization.
  • Collaborated with IT teams to implement effective security measures, safeguarding critical data and systems.
  • Enhanced network security by monitoring systems for potential threats and vulnerabilities.
  • Reduced false alarms by fine-tuning intrusion detection system configurations based on historical analysis of incidents.
  • Improved incident management workflows through streamlined communication between SOC Analysts, IT departments, and other relevant parties.
  • Monitor the security of network systems for security breaches and Incidents. Monitor changes to highly sensitive computer security controls to ensure appropriate system administrative actions,investigate and remediate. Prepare detailed reports pertaining to incidents and/or malicious damage, extent of the damage and remediated actions taken.
  • Trained junior analysts in threat intelligence gathering techniques, improving overall team efficiency.
  • Identified root causes of security breaches through thorough investigation and analysis of log data.
  • Streamlined incident response processes for quicker threat detection and remediation.
  • Conducted comprehensive security assessments to identify risks and recommend mitigation strategies.
  • Evaluated new cybersecurity solutions through rigorous testing procedures, recommending the most appropriate technologies based on specific requirements and budget constraints.
  • Promoted a culture of security awareness through regular training sessions, presentations, and workshops for employees at all levels.
  • Supported compliance initiatives by conducting regular audits of security controls and providing recommendations for improvement.
  • Provided expert guidance on cybersecurity trends and emerging threats to internal stakeholders for informed decisionmaking.
  • Implemented automated tools for continuous monitoring of system logs, reducing manual efforts by the team.
  • Provided technical support during high-priority incidents, ensuring timely resolution with minimal impact on business operations.
  • Reduced false positive alerts, fine-tuning security monitoring tools based on detailed analysis.
  • Conducted in-depth analysis of security breaches to determine their root causes and prevent future incidents.
  • Initiated regular penetration testing to evaluate effectiveness of security measures.
  • Guided junior analysts in investigation of complex security incidents, fostering culture of learning and development.
  • Led cybersecurity awareness programs, increasing staff vigilance against phishing and social engineering attacks.
  • Facilitated cross-departmental collaboration efforts to develop unified security protocols.
  • Monitored real-time security alerts to identify potential threats, significantly reducing incident response times.
  • Enhanced team knowledge with regular training sessions on latest cybersecurity trends and threats.
  • Coordinated with external security vendors to enhance threat intelligence and defense mechanisms.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Collaborated with IT teams to integrate security measures into the development and deployment of new applications.
  • Reduced downtime caused by security incidents by establishing robust incident management and recovery framework.
  • Developed and enforced stringent cybersecurity policies, significantly reducing risk of data breaches.
  • Led cybersecurity awareness training sessions, increasing staff vigilance against phishing and social engineering attacks.

Jr SOC Analyst

ValueLabs
06.2017 - 07.2019
  • Maintained accurate documentation of all SOC activities, facilitating knowledge sharing across the organization.
  • Collaborated with IT teams to implement effective security measures, safeguarding critical data and systems.
  • Enhanced network security by monitoring systems for potential threats and vulnerabilities.
  • Reduced false alarms by fine-tuning intrusion detection system configurations based on historical analysis of incidents.
  • Improved incident management workflows through streamlined communication between SOC Analysts, IT departments, and other relevant parties.
  • Trained junior analysts in threat intelligence gathering techniques, improving overall team efficiency.
  • Conducted comprehensive security assessments to identify risks and recommend mitigation strategies.
  • Streamlined incident response processes for quicker threat detection and remediation.
  • Identified root causes of security breaches through thorough investigation and analysis of log data.
  • Supported compliance initiatives by conducting regular audits of security controls and providing recommendations for improvement.
  • Provided expert guidance on cybersecurity trends and emerging threats to internal stakeholders for informed decisionmaking.
  • Provided technical support during high-priority incidents, ensuring timely resolution with minimal impact on business operations.
  • Implemented automated tools for continuous monitoring of system logs, reducing manual efforts by the team.
  • Promoted a culture of security awareness through regular training sessions, presentations, and workshops for employees at all levels.
  • Evaluated new cybersecurity solutions through rigorous testing procedures, recommending the most appropriate technologies based on specific requirements and budget constraints.
  • Developed comprehensive incident response plans, streamlining process of mitigating cyber attacks.
  • Coordinated with external security vendors to enhance threat intelligence and defense mechanisms.
  • Led cybersecurity awareness programs, increasing staff vigilance against phishing and social engineering attacks.
  • Optimized data protection strategies, ensuring compliance with industry regulations and safeguarding sensitive information.
  • Improved system security by configuring firewalls and intrusion detection systems.
  • Enhanced team knowledge with regular training sessions on latest cybersecurity trends and threats.
  • Initiated regular penetration testing to evaluate effectiveness of security measures.
  • Played key role in selection and deployment of cybersecurity software, enhancing overall network defense capabilities.
  • Conducted in-depth analysis of security breaches to determine their root causes and prevent future incidents.
  • Reduced false positive alerts, fine-tuning security monitoring tools based on detailed analysis.
  • Facilitated cross-departmental collaboration efforts to develop unified security protocols.
  • Spearheaded implementation of SIEM solution, enhancing organization's ability to detect and respond to threats.
  • Analyzed and reported on security trends, providing actionable insights for strategic planning.
  • Strengthened network security by implementing advanced threat detection systems.
  • Guided junior analysts in investigation of complex security incidents, fostering culture of learning and development.
  • Ensured continuous system monitoring, detecting anomalies that could indicate potential security threats.
  • Collaborated with IT department to ensure seamless application of security policies across all technology platforms.
  • Monitored real-time security alerts to identify potential threats, significantly reducing incident response times.
  • Updated security procedures and documentation, keeping pace with evolving cyber threats and industry best practices.
  • Conducted thorough security audits, identifying vulnerabilities and recommending necessary enhancements.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Conducted security audits to identify vulnerabilities.
  • Developed plans to safeguard computer files against modification, destruction, or disclosure.
  • Recommend improvements in security systems and procedures.
  • Encrypted data and erected firewalls to protect confidential information.

Education

Master of Science - Computer And Information Systems

Sacred Heart University
Fairfield, CT
04-2023

Skills

  • NIST SP
  • ISO 27001 Compliance
  • Risk Management Framework Expertise
  • HIPPA
  • HITRUST CSF
  • PCI DSS
  • Intrusion Prevention
  • Cyber kill chain model analysis
  • Cyber Threat Analysis
  • Security Information and Event Management (SIEM)
  • Threat and Vulnerability security solution
  • IPS
  • IDS
  • Log management
  • Security assessment systems
  • Intrusion Detection & Prevention (IDS/IPS)
  • Data Loss Prevention (DLP)
  • Forensics
  • Sniffers
  • Malware analysis tools
  • IPSEC VPN design
  • IPSEC tunnel configuration
  • Encryption protocols
  • Integrity protocols
  • Network monitoring
  • ArcSight
  • Splunk
  • CarbonBlack
  • FireEye
  • Cisco Talos
  • Wire Shark
  • Nessus
  • Qualys Continuous Monitoring
  • Vulnerability Management
  • Web Application Scanning
  • ThreatProtect
  • Policy Compliance
  • Cloud Agents
  • Asset Management
  • Governance
  • Risk Management
  • Compliance
  • RSA Archer
  • Blue Coat Proxy
  • PenTest Tools
  • Metasploit
  • NMAP
  • Symantec Endpoint Protection
  • Symantec DCS
  • Symantec DLP
  • WhiteHat Web Security
  • Tufin
  • Proofpoint
  • IDefence
  • NTT Security
  • Blue Coat Web Gateway
  • LogRhythm
  • McAfee Nitro (SIEM)
  • McAfee ePO
  • McAfee Endpoint Protection Suite
  • McAfee DLP
  • Windows
  • NT
  • Windows 98
  • Windows XP
  • Windows 2000
  • Windows 2003
  • Windows 2007
  • MSDOS
  • Linux
  • SIEM management
  • Vulnerability assessment
  • Incident response
  • Nmap scanning
  • Security policies
  • Physical security
  • Packet analysis
  • Forensic investigation
  • TCP and IP protocols
  • Intrusion detection
  • Social engineering
  • Application security
  • Mobile security
  • Python programming
  • Compliance standards
  • Bash scripting
  • Wireshark usage
  • Database security
  • Security awareness training
  • Scripting languages
  • PowerShell scripting
  • Virtualization security
  • Access control
  • Regular expressions
  • DNS management
  • Encryption techniques

Timeline

Sr. SOC Analyst

Comcast
04.2023 - 01.2025

Information Security Analyst

Infoblox
07.2022 - 04.2023

L2 SOC Engineer

Sacred Heart University
01.2022 - 07.2022

SOC Analyst

CSS Corp Private Ltd
08.2019 - 11.2021

Jr SOC Analyst

ValueLabs
06.2017 - 07.2019

Master of Science - Computer And Information Systems

Sacred Heart University
Bharath Parupalli