Summary
Overview
Work History
Education
Skills
Certification
References
Languages
Timeline
Generic

Lekhya Uppati

TN

Summary

Detail-oriented Cyber Security Analyst with four years of hands-on experience in protecting organizational data and infrastructure from cyber threats. Proficient in conducting vulnerability assessments, implementing security protocols, and monitoring networks for suspicious activities. Skilled in incident response and risk management, with a strong understanding of security frameworks and compliance regulations. Proven track record of collaborating with cross-functional teams to enhance security posture and streamline processes. Committed to continuous learning and staying abreast of emerging threats and technologies in the cybersecurity landscape.

Overview

5
5
years of professional experience
1
1
Certification

Work History

Cashier

Walmart
04.2024 - Current
  • Built relationships with customers to encourage repeat business.
  • Restocked and organized merchandise in front lanes.
  • Resolved customer complaints professionally, leading to improved customer relations and loyalty.
  • Streamlined checkout process for increased efficiency and reduced waiting times.
  • Managed inventory levels effectively, reducing stock shortages and minimizing wastage.
  • Developed rapport and fostered brand loyalty by offering personalized service.
  • Managed cash drawer accurately, ensuring all transactions balanced at end of day.
  • Used POS system to enter orders, process payments and issue receipts.
  • Demonstrated product features, answered questions and redirected objections to highlight positive aspects.

Network Security Engineer

CSS Corp.
03.2020 - 08.2023
  • Involved in using servers for the App in performing on-going security monitoring and detailed assessments of the organization’s information systems, security risks, and providing management reports on issues and corrective action plans
  • Led the development of security procedures and documentation to ensure the business is compliant with all corporate security policies.
  • Maintained robust security posture by regularly updating security policies and procedures.
  • Designed secure network architectures, incorporating best practices and latest industry standards.
  • Dealt with authentication systems like checking with the connections, security policies, protocols and standards and aligning them to the Information Technology policies, standards, and the industry best practices
  • Leads the day-to-day administration of active directories including Windows Active Directory object maintenance
  • Takes responsibility for management of multiple Domain Controllers located across multiple domains and sites
  • Conducts complex troubleshooting and repair tasks on Active Directory, Domain Controllers, DNS, DFS, NPS, and DHCP configurations, user authentication, and other operational systems
  • Develops, deploys, and troubleshoots Group Policy
  • Perform fraud and spam investigations using various data sources, identify product vulnerabilities and drive anti-abuse experiments to prevent abuse.
  • Having good experience in querying and analyzing large, complex datasets to pull out relevant insights, metrics, and trends.
  • Having good understanding of operating systems, infrastructures, and network protocols
  • Administer DNS, DFS, NPS, and DHCP and supports the infrastructure
  • Good level of understanding and implementation of commonly deployed WAN technologies and concepts like MPLS, SDWAN, P2P, WAN Optimization, etc
  • Good knowledge of Layer 3 technologies, including IPv4, BGP, OSPF, EIGRP, GETVP, etc
  • Having good Subject Matter Expert (SME) knowledge on network security technologies like Palo Alto
  • Dealt with priority level tickets
  • Have a basic knowledge and understanding of security risk management frameworks (specifically, ISO 27001-27002, SOC 2) requirements and standards
  • Assist in the continuous development, implementation, and ongoing maintenance of the security training and awareness education program
  • Assisting operations team in handling Tier 1-2 security tickets, by utilizing Sophos firewall ticketing applications
  • Creating and updating technical documents such as case related analysis and application updates
  • Basic understanding of information technology and cyber security
  • Experience working with Microsoft Office products such as Excel, Word, and PowerPoint
  • Foundational understanding of SOX compliance and IT controls, along with a willingness to learn and grow within the organization.
  • Identifying security breaches.
  • Identifying and analyzing areas of potential risk to assets, resources or success of organization.
  • Analyzing security events.
  • Analyzing security operations to identify risks or opportunities for improvement.
  • Advising, implementing and maintaining security systems.
  • Analyzing and investigating intruder detection on security systems.
  • Mitigating situations that might lead to security breaches.
  • Recommending ways to conduct assessments to reduce risk.
  • Identifying key risks and mitigating factors for customer bases or industry segments.
  • Determining escalation for security events.
  • Recommending improvements in security systems or procedures.
  • Conducting security audits to identify potential problems related to physical security, staff safety, or asset protection and to satisfy state and federal regulations.
  • Performing risk assessments and executing tests of data processing system to ensure functioning of data processing activities and security measures.
  • Evaluating security operations to identify risk or opportunities for improvement.
  • Confer with users to discuss issues such as computers data access needs security violations, and programming changes.
  • Preparing, maintaining, or updating security procedures, security system drawings, or related documentation.
  • Documenting and ensuring communication of key risk.
  • Maintaining input or data quality of systems.
  • Establishing and maintaining contact with peers.
  • Conveying the importance of security recommendations, procedures, policies and level of risk to customers
  • Evaluating the knowledge and responsiveness of contractors to accomplish organizational outcomes.
  • Gathering risk-related data from internal or external resources.
  • Utilizing communication channels such as, email and messaging.
  • Notifying customers of potential security threats.
  • Notifying customers of security changes that may affect their access.
  • Interpreting the Meaning of Information for Others
  • Producing reports or presentations that outline findings, explain risk positions, or recommend changes.
  • Dealt with assessments and remediation efforts
  • Having good critical thinking and analysis skills with the ability to create correlations and visualizations in and across tools and data sets to identify patterns, anomalous and potentially malicious behavior.
  • Hands-on experience in network and firewalls
  • Having good knowledge on machine learning systems.
  • Having good experience with SQL and Python
  • Having good knowledge in cryptography, multi-party computation, or optimal key management techniques
  • Having good experience with tools used for wireless, web application, and network security testing.
  • Expert-level hands-on configuration of networking equipment, management tools and network analysers.
  • Thorough understanding of intermediate to advanced security and network concepts (Operating systems, intrusion/detection, TCP/IP, ports, etc.)
  • Experience with host and network-based security tools
  • Experience with network monitoring in a SOC environment
  • Ability to demonstrate analytical expertise, close attention to detail, excellent critical thinking, logic, and adaptive learning
  • Ability to navigate ambiguity and develop working business relationships
  • Ability to write detailed methods of procedure and maintain documentation in JIRA and make those available for future references and analysis for similar scenarios
  • Assisting customers in a close and efficient manner, attending to any conclusions or suggestions they may have.

Education

Master of Science - Cyber Security

GVPCOE
Andhra Pradesh, India
01.2018

Bachelor of Science - Computer Science

Vignan Institute of Information Technology
Andhra Pradesh, India
01.2015

Skills

  • Penetration Testing
  • Risk Management
  • Route summarization
  • Linux
  • OSI and TCP/IP model
  • Load balancing
  • REST
  • Vulnerability Assessment
  • Event Management (SIEM)
  • Incident Response
  • Splunk
  • LAN and WAN connections
  • IPV4
  • Subnetting
  • DNS, DHCP
  • NAT, PAT
  • CCNA
  • Wireshark
  • Performance Testing
  • Access Management
  • VLAN, STP, VTP
  • Ether channel
  • HTML, XML, PHP, C
  • Object Oriented Programming
  • Java, Perl, Batch
  • Azure platforms
  • MySQL, RIP
  • EIGRP, OSPF, BGP

Certification

  • CCNA (Cisco Certified Network Associate)
  • CCNP (Cisco Certified Network Professional)

References

  • Ram, CSSCorp, Team Lead
  • Hari, CSSCorp, Team Lead
  • Chirag Vaza, CSSCorp, Team Lead
  • Kimberly, Walmart, People Lead

Languages

Telugu
Native or Bilingual
English
Full Professional
Hindi
Professional Working

Timeline

Cashier

Walmart
04.2024 - Current

Network Security Engineer

CSS Corp.
03.2020 - 08.2023

Master of Science - Cyber Security

GVPCOE

Bachelor of Science - Computer Science

Vignan Institute of Information Technology
Lekhya Uppati