Summary
Overview
Work History
Education
Skills
Websites
Projects
Timeline
Generic

Harsh Cheema

Bristow,VA

Summary

Experienced with network forensics, threat analysis, and incident response. Utilizes analytical skills to fortify systems against potential breaches. Strong understanding of risk management and proactive security measures. My current training is focused on penetration testing and cryptography.

Overview

6
6
years of professional experience

Work History

Security Engineer

Google
05.2023 - Current
  • Reviewed system logs and identified suspicious activity.
  • Monitored network traffic for malicious or unauthorized activities.
  • Created reports documenting security incidents and recommended corrective actions.
  • Analyzed threats from internal and external sources and implemented countermeasures.
  • Analyzed Splunk data for anomalies and identified potential security risks.
  • Created custom search queries to extract meaningful insights from Splunk data sets.
  • Tuned existing searches to improve accuracy and reduce false positives or negatives.
  • Managed incident response using Splunk, reducing impact of security threats on business continuity.
  • Participated in regular threat hunting activities aimed at proactively identifying potential risks before they materialize.

Cyber Forensic Analyst

Brickner Kelly and Associates
02.2023 - 03.2023
  • Vulnerability research on any electronic device or part
  • Mobile Forensics using tools such as Encase, FTK Imager, Autopsy etc.

Cyber Detection Engineer

ManTech
10.2022 - 02.2023
  • Covering all SOC Analyst Tier 1 activities and training
  • Mapping MITRE ATT&CK Framework for cyber defense applications
  • Research on MITRE ATT&CK techniques on and using open source research to modify or create better detection rules
  • Researched industry trends in order to identify potential areas of improvement.
  • Improved system performance by analyzing and optimizing engineering processes.

Python Developer

ManTech
05.2022 - 09.2022
  • Analyze properties of mobile applications
  • Using Mobile Forensics in order triage and obtain information for a mobile device
  • Developing python modules to analyze data.
  • Used Jira for project management, enhancing team collaboration.
  • Led code reviews to promote best practices and knowledge sharing.

Senior Information Security Analyst

Scorpio Transportation Inc.
06.2020 - 05.2022
  • Automated tasks to schedule tasks and keeping time with Python
  • Troubleshooting problems in a Unix, Windows, and Mac OS environment
  • Hardening Computer security and reducing attack surface practices
  • Handling permission and documents of the president
  • Discovered Web vulnerabilities on the FMCSA portal.
  • Reduced company risk by conducting thorough vulnerability assessments and recommending appropriate remediation strategies.

Honors Intern

FBI
06.2019 - 03.2020
  • Shadowed Booz Allen Forensic analysis and reverse engineer contractors
  • Identified financial fraud between international banks and rep subsidiary that will resolve the fraud
  • Reported cyber security breaches and pushed into the databases.

Education

Master of Science - Cyber Security

New York University
05-2024

Bachelor of Science - Cybersecurity Engineering

George Mason University
01.2021

Skills

  • Penetration Testing
  • Threat Detection
  • Intrusion Detection and Threat Hunting
  • Python
  • Incident Response
  • Currently pursuing higher level cryptography

Projects

Cloud SIEM playbook using Azure Sentinel - In the process of creating a cloud Security Information and Event Management (SIEM) playbook using Azure Sentinel. Will build a sample virtual network with Azure with network security groups, route tables, resource groups along with virtual machines.

Android Repackaging Attack- Performed an Android Repackaging attack on a basic Android OS application. Used APKTool to reverse engineer and insert a malicious payload into the APK. Upon system rebooting, the malware deploys, erasing all contact information in the device. Simulated in VMs, involved Java code, video of demonstration on YouTube.

Drone Hacking Competition-Used Wireshark to examine wireless communication between the Parrot Bebop 2 drone and controller. Developed python scripts to hijack control of the drone and run commands from a laptop. Involved spoofing of ARSDK packets, use of evil twins, and understanding of WPA authentication and association.

Digital Forensics Expert Witness Report -Created a formal expert witness report written from a digital forensic experts where we are given a hypothetical scenario in the beginning of the semester and we have to follow government guidelines to write a chain of custody, make sure the digital image does not lose integrity, scan it for malware, analyze the image for evidence. A report was written that contained relevant evidence to the case and explained in an unbiased way. Tools such as FTKImager, OSFMount, Autopsy, HashCalc, etc were used., Summer 2020

Timeline

Security Engineer

Google
05.2023 - Current

Cyber Forensic Analyst

Brickner Kelly and Associates
02.2023 - 03.2023

Cyber Detection Engineer

ManTech
10.2022 - 02.2023

Python Developer

ManTech
05.2022 - 09.2022

Senior Information Security Analyst

Scorpio Transportation Inc.
06.2020 - 05.2022

Honors Intern

FBI
06.2019 - 03.2020

Master of Science - Cyber Security

New York University

Bachelor of Science - Cybersecurity Engineering

George Mason University
Harsh Cheema