SOC |SIEM|Security Analyst | Vulnerability/Patch Management
The objective is to find a challenging role in a reputable organization to utilize my technical and management skills for the growth of the organization and to enhance my knowledge in IT sector.
Professional Summary : Experienced IT professional with a broad set of skills applicable across different roles in Security Operation Center (SOC) & Vulnerability/Patch Management. Expert in handling and managing 24/7 day-to-day activities of SOC. Demonstrated experience in developing and managing Service Level Agreements (SLAs) and Key Performance Indicators (KPIs). Experienced in security technologies: Security information and event management (SIEM-Qradar, Splunk, LogRhythm), IDS/IPS, Proxy, Web Application Firewall (WAF), Anti-Virus, Sandboxing, firewall, etc. Experienced on SOAR solutions like(Swimlane & IBM Qradar resilient) Experienced on IAM(PAM(Beyond Trust) & on Firewalls (SonicWALL, Cisco & Fortinet). Hands-on experience in real-time logs monitoring, analysis, investigation, incident handling, reporting, and escalations of security events and their mitigation. Log analysis, detection, analytical and problem-solving skills. Documenting the tickets with all the action updating incidents & reporting. Good Knowledge about EDR Solutions (Crowd strike, Trend Micro-XDR) and vulnerability assessment tools(Qualys,Nesus). Experienced in Office 365 Security Center Experienced in Data Loss Prevention (DLP) incident handling using Mcafee, Office 365 & Symantec tools. Hands-on experience in Monitoring alerts generated from the DLP tool. Incident management and follow-up with concerned teams to resolve Incidents and escalate to senior management. Conduct daily review, triage, and escalation of detected and user-reported information security events. Hands-on Experience -VA/Vulnerability Management, Configuration Management & Monitoring for Servers & Network Devices.Implemented the CSD deviations on the new build servers Experience in Software distribution& OS deployment through SCCM 2012 Experience in Managing Windows, and Linux Servers. Managed HP blade servers through iLO and Dell servers through iDRAC Managed AD users and groups - the creation of users, groups, OU, and applying basic GPOs at the OU level. Maintained inventory through CMDB and active directory Experience in Incident Management, problem management, and change management. Managed a team of Service Desk engineers. Experienced in Monitoring and Troubleshooting alerts of routers and switches, Extreme switches, and various other Networking devices. Experienced in Vulnerability Management (Qualys, Nessus) & Patch Management(SCCM) Expertise in using Manage engine, BMC Remedy, Marvel, and many other tools and applications. Perform hunting for malicious activity across the network and digital assets Conducts analysis using a variety of tools and data sets to identify indicators of malicious activity on the network
Collaborates with technical and threat intelligence analysts to provide indications and warnings, and contributes to predictive analysis of malicious research maintain malware to assist with threat support-related the security services and technologies involving the SIEM configuration & planning, and incident response.
Lead incidents, coordinating and directing multiple subject matter experts internal and external to the project support related tasks to integrate security platforms as well as ongoing tuning support for existing technology. Specialize in network-centric analysis utilizing a variety of tools and techniques such as Network Security Monitoring, log analysis, and more technical leadership guiding the development and evolution of our security monitoring platform as well as detection and response procedures.