Summary
Overview
Work History
Education
Skills
Timeline
Generic

Sangeetha Kasiviswanathan

Tampa,FL

Summary

Dedicated professional prepared to bring extensive expertise and results-oriented approach to Specialist role. Known for effectively managing tasks and supporting organizational goals through collaborative efforts and adaptive strategies. Recognized for excellent communication and analytical skills, ensuring seamless operations and consistent outcomes.

Overview

8
8
years of professional experience

Work History

Specialist Cybersecurity

Larsen & Toubro Infotech Mindtree IT Consulting & Technology Private Ltd
03.2019 - 01.2025
  • Hands on experience with malware & exploit analysis, threat research detection signatures, threat modelling, malware exploit writing.
  • Ensure Online systems and networks are sufficiently protected from threats.
  • Assist with strategic planning, assessment and operational execution of all cyber security strategies, policies.
  • Establish and maintain a comprehensive information security programs to ensure that all information assets are adequately protected against current future internal and external threats.
  • Hands on experience with Mobile or OSX malware.
  • Assist in incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts.
  • Experience with Reverse engineering malicious files PE Scripts, PDF Macro etc.
  • Familiarity with Debuggers (Olldbg) and Disassemblers (IDA Pro), network protocols (Wireshark, fiddler).
  • Experience with Malware detection languages such as YARA, static or behavioral signature languages.
  • Understanding of Linux fundamentals, Scripting tools Perl or Python and C programming.
  • Kusto Query experience in building custom queries, searches, creating correlated alerts and dashboard

Senior Data Analyst

Techwaukee Pvt Ltd
10.2017 - 03.2019
  • Providing support for the ransowmares (Decrypting the data), dealing with crypto data and bitcoins.
  • Hands-on labs, follow a cohesive scenario simulating a cybercrime investigation and skills in locating and examining evidence on devices and forensic images, as well as analyzing and reporting findings.
  • Critical techniques and information about identifying, preserving, extracting, analyzing and reporting forensic evidence on computers and mobile devices through use of the most popular computer forensic tools.
  • The challenges of computer and mobile forensics; walk through the process of analysis and examination of operating systems and mobile devices; and gain deep understanding of differences in evidence locations and examination techniques on Windows and Linux computers and on Android, iOS and Windows phones.
  • Proven Data Recovery-NY

IT Analyst

Deloitte US Consulting Pvt Ltd
11.2016 - 07.2017
  • Knowledge of Antivirus (Symantec, Norton, CA e-trust etc.) & personal computer software (Microsoft Office Suite 03-07) §
  • Knowledge of creating & implementing software imaging through Symantec Ghost.
  • Comprehensive knowledge of desktop & laptop PC hardware, maintaining other computer peripheral devices such as printers, End-User Devices (PDAs, Smart Phones, Blackberry devices, etc.)
  • Maintains all workstation hardware and software in accordance with company’s standard guidelines to ensure optimum performance and consistently demonstrates a general knowledge of company’s process, practices and procedures.
  • Incident logging tools like Remedy, HP Service Desk, CA Service Desk etc.
  • Record all actions, conversations and work undertaken in the IT Service Management Tool (Service Now) Within Service Now, use the knowledge base for known errors and work around to aid diagnosis or resolution.

Education

Bachelor of Engineering - Computer Science and Engineering

Anna University
Chennai, India
05.2015

Skills

  • Proficiency with security tools such as SIEM (eg, Splunk, Sumologic, Sentinel), EDR (eg, CrowdStrike, SentinelOne), and packet capture analysis tools (eg, Wireshark)
  • Strong understanding of the framework and its application in threat hunting
  • In-depth knowledge of operating systems (Windows, Linux, macOS), network protocols (TCP/IP), and cloud security principles (AWS, Azure, GCP)
  • Experience with scripting languages (eg, Python, PowerShell) for automation and analysis
  • Strong understanding of cloud security concepts, platforms (AWS, Azure, GCP)
  • Experience in risk and compliance management and process development in the areas of information technology and security
  • Advanced knowledge of risk mitigation and business controls
  • Excellent problem resolution and creative problem-solving skills
  • Excellent project management skills and strong knowledge of change management processes
  • Analytical Mindset: Exceptional analytical, problem-solving, and critical-thinking skills with a keen eye for detail
  • Communication: Excellent written and verbal communication skills, with the ability to articulate complex technical concepts to diverse audiences

Timeline

Specialist Cybersecurity

Larsen & Toubro Infotech Mindtree IT Consulting & Technology Private Ltd
03.2019 - 01.2025

Senior Data Analyst

Techwaukee Pvt Ltd
10.2017 - 03.2019

IT Analyst

Deloitte US Consulting Pvt Ltd
11.2016 - 07.2017

Bachelor of Engineering - Computer Science and Engineering

Anna University
Sangeetha Kasiviswanathan