Summary
Overview
Work History
Education
Skills
Timeline
Generic

Kyasaram Niharika

Bear,DE

Summary

Dynamic, confident and results-oriented Cyber security analyst with over 7 years of leverage experience in information assurance (Vulnerability assessment, Compliance and RMF). I'm Experienced and skilled in monitoring systems with vulnerabilities identification through periodic scans using tenable Nessus, openVAs and Qualys Guard.

Overview

5
5
years of professional experience

Work History

Vulnerability Analyst

WIPRO
05.2018 - 08.2021
  • Scripting skills with an automation language (Perl, Python, PowerShell, Ruby, etc)
  • Experience in managing and operating IT infrastructure with hands on experience on Firewall’s, VPN and other Security appliances
  • Prior experience administering Windows and Linux systems; administrator and root privileges
  • Strong experience analyzing exploits related to commonly exploited software
  • Maintain the relationship with the CIC’s Cyber Check vulnerability 3rd party vendor
  • Have a broader perspective of potential issues encountered when managing diverse teams and the strategies to overcome them; have a clear understanding of the firm’s commitment to creating a more inclusive culture
  • Experience in the information security and/or IT risk management field related to network, host, database and/or application security in multiple operating system environments is required
  • Experience with vulnerability management tool (Qualys, others)
  • Prior experience with Azure AD Connect synchronization tool
  • Solid technical and security knowledge and experience with at least 5yrs experience in complex IT systems management and support
  • Leadership and mentorship skillCreate scans policy and scan jobs
  • Create, unlock, and reset passwords in SC
  • Perform remediation scans
  • Prepare SA Schedules
  • Prepare security Assessment Plans ( SAP)
  • Kill job queues, stop and import scans that last for more than 24 hours
  • Update our organization dashboard
  • Update organizations plugins in other to increase the credentials scan percentage
  • Create discovery scans
  • Create report attributes
  • Create tickets and follow up
  • Investigate on scan jobs not completed
  • Recognize and escalate scanner's status
  • Interact with co-workers and resolve their issues over the phone
  • Investigate on source IPs and request the IPs to be whitelisted if need be
  • Investigate on slow scans and emailed solutions to PITT Team

Security Analyst

Accenture
12.2016 - 04.2018
  • Scripting skills with an automation language (Perl, Python, PowerShell, Ruby, etc)
  • Experience in managing and operating IT infrastructure with hands on experience on Firewall’s, VPN and other Security appliances
  • Prior experience administering Windows and Linux systems; administrator and root privileges
  • Strong experience analyzing exploits related to commonly exploited software
  • Prior experience with Azure AD Connect synchronization tool
  • Developed, reviewed, and updated Security Assessment Plan (SAP), Security Control Test Plan, Security Control Requirement Traceability matrix (SCRTM), and Documentation Request List (DRL) and get them approved before kicking off the assessment.
  • Experience with web application security such as OWASP . Kali Linux
  • Develop post assessment A&A packages to include SSP, SAR, POA&M, and ATO Letter.
  • Conduct assessment Kick-off meetings and review the Security Assessment Plan (SAP) with the stakeholders for approval prior to the actual assessment.
  • Developed, reviewed, and updated Security Assessment Plan (SAP), Security Control Test Plan, Security Control Requirement Traceability matrix (SCRTM), and Documentation Request List (DRL) and get them approved before kicking off the assessment.
  • Reviewed security artifacts such as System Security Plans, inventories, screenshots of technical files, Scan data, requirement traceability matrices, control allocation tables, and security assessment reports.
  • Support the Information System Security Officer (ISSO) and collaborated with the system's Information System Owner (ISO).
  • Review organizational policies, standards and procedures and provided advice on their adequacy, accuracy and compliance following NIST standard guidelines.
  • Monitor security controls post authorization to ensure continuous compliance with the security requirements.
  • Motivated and encouraged team members to communicate more openly and constructively with each other.

Education

Master of Science - Information Assurance

Wilmington University
New Castle, DE
05.2023

Bachelor of Science - Computer And Information Sciences

Jawaharlal Nehru Technological University
IHyderabad , India
05.2016

Skills

  • NMAPS , OpenVAS , Qualys Guard
  • Knowledge on OWASP TOP 10 , CWE/SANS TOP 25
  • Tenable Nessus
  • Kali Linux , Burp Suite
  • Reporting and documentation
  • POA&M Management
  • EMASS
  • Compliance / Configuration Management (STIG) and SCAP scan
  • Windows Server 2012 and 2016
  • Excel, Word, Access, and PowerPoint
  • SDLC
  • PowerShell , Perl , Regex
  • Monitoring computer viruses
  • Encryption
  • Risk mitigation
  • Data Management
  • MS SQL Server and MySQL
  • IDEMS Visual Source Safe, HTML Dream weaver

Timeline

Vulnerability Analyst

WIPRO
05.2018 - 08.2021

Security Analyst

Accenture
12.2016 - 04.2018

Master of Science - Information Assurance

Wilmington University

Bachelor of Science - Computer And Information Sciences

Jawaharlal Nehru Technological University
Kyasaram Niharika