Results-driven Cybersecurity Around 4 years of hands-on experience in vulnerability management, network security, and incident response. Expert in conducting comprehensive risk assessments, implementing firewall policies, and enforcing security controls across hybrid environments. Proven track record in leveraging industry-leading tools like Nessus, Qualys, Wireshark, SonarQube, and Checkmarx to proactively identify and mitigate security vulnerabilities.
Experienced in designing and executing disaster recovery plans, improving organizational resilience during security incidents with minimal downtime.
Key achievements include a 70% reduction in critical vulnerabilities through automated scanning and patching cycles, as well as a 40% improvement in incident detection and response time via optimized SIEM alerting and escalation workflows. Adept at collaborating cross-functionally with development and operations teams to implement secure coding practices and integrate security into the software development lifecycle (SDLC).
RESPONSIBILITIES
Led end-to-end vulnerability management using Nessus and Qualys, analyzing findings and coordinating with sysadmins for timely remediation.
Designed and enforced network segmentation and firewall policies (FortiGate/Palo Alto) to isolate critical banking services and reduce attack surfaces.
Integrated Microsoft Defender for Endpoint and Azure AD Conditional Access for endpoint protection and identity security across hybrid environments.
Conducted threat hunting and incident triage in collaboration with the SOC team, using packet analysis (Wireshark) and event correlation.
Automated compliance reporting and patch tracking with PowerShell and Python, reducing manual audit prep efforts.
Supported PCI-DSS and ISO 27001 controls through continuous monitoring, logging, access control, and encryption policy enforcement.
KEY RESULTS
Reduced critical vulnerabilities by 70% within the first 3 months through automated scanning and structured patch cycles.
Improved incident detection and response time by 40% by optimizing SIEM alerts and escalation workflows.
RESPONSIBILITIES
Utilized Wireshark and Nessus to continuously monitor network traffic, identifying suspicious activities, vulnerabilities, and security threats, and ensuring timely remediation.
Assisted in the deployment of firewall policies and network segmentation to enhance security posture by reducing attack surfaces and limiting access to critical systems.
Conducted comprehensive risk assessments and security audits for internal systems, including web applications and network infrastructure, identifying vulnerabilities and providing actionable remediation strategies to minimize risks.
Worked closely with development teams to integrate security testing into the CI/CD pipeline, utilizing tools like SonarQube and Checkmarx to identify and address vulnerabilities during the software development lifecycle.
Contributed to the design and implementation of disaster recovery (DR) and business continuity plans to ensure minimal downtime during security incidents and quick recovery from disruptions.
KEY ACHIEVEMENTS
Strengthened the organization’s security posture by reducing vulnerabilities by 40% through continuous monitoring and remediation.
Successfully integrated security testing tools (Sonar Qube, Checkmark) into the CI/CD pipeline, improving the security of application deployments and reducing the number of vulnerabilities in production.
Improved disaster recovery processes and ensured business continuity during security incidents, resulting in minimal operational downtime.
Network Security & Traffic Analysis: Wireshark, Nessus, Network Protocols (TCP/IP, DNS, HTTP, SSL/TLS),IDS/IPS
Firewall Configuration: FortiGate, Palo Alto Networks, Cisco ASA,
Network Segmentation: VLAN, Subnetting, DMZ, Zero Trust Architecture
VPNs: Site-to-Site, Client VPN (IPsec, SSL VPN)
Risk Management : Vulnerability Assessments, Threat Modeling (STRIDE, DREAD)
Security Audits: OWASP Top 10, CIS Controls, NIST, ISO 27001
Compliance Standards: PCI-DSS, GDPR, HIPAA
Vulnerability Scanners: Nessus, OpenVAS, Qualys
Patch Management Solutions: WSUS, SCCM, SolarWinds, Shavlik
vulnerability Remediation: CVSS Scoring, Risk Prioritization
CI/CD Tools: Jenkins, GitLab, Bamboo
SAST: SonarQube, Checkmarx, Fortify
Secure Coding Practices: OWASP Top 10, Secure SDLC
DevSecOps: Security Automation in CI/CD Pipelines
Disaster Recovery Planning: Veeam, AWS Backup, Azure Site Recovery
Cloud Security: AWS, Azure, Google Cloud Platform (GCP)
Incident Response: Incident Handling, Forensics, Post-Incident Analysis
Web Application Vulnerability Testing: Burp Suite, Acunetix, AppScan
OWASP: OWASP Top 10, OWASP ZAP, Threat Modeling (STRIDE, DREAD)
Cloud Platforms: AWS, Azure, Google Cloud
Cloud Security Best Practices: IAM, Security Groups, Encryption
Identity & Access Management (IAM):MFA, RBAC, SSO