Security professional with extensive experience in designing and implementing comprehensive security strategies. Proven track record in identifying vulnerabilities and mitigating risks, ensuring seamless protection of critical assets. Known for collaborative teamwork and adaptability, consistently achieving high-impact results in dynamic environments.
Security professional prepared for advanced roles with rich experience in safeguarding systems and networks. Strong track record of implementing security protocols, managing risk, and leading incident response initiatives. Known for collaborative approach, adaptability, and delivering reliable results under evolving conditions. Skilled in threat analysis, vulnerability assessment, and firewall management, with focus on maintaining high standards and ensuring optimal security performance.
Diligent with strong background in security engineering. Adept at designing and implementing robust security protocols and has successfully led numerous security audits and incident response initiatives. Demonstrated expertise in threat analysis and risk management, ensuring highest levels of organizational security.
Experienced with network security, vulnerability assessment, and incident response. Utilizes holistic approach to analyze and mitigate potential threats, ensuring robust security postures. Knowledge of industry best practices and regulatory compliance, enforcing stringent security standards.
Trusted Network Security Engineer with 10 years protecting companies against bad actors who disrupt business operations. Serves as primary safeguard against external threats. Educates colleagues on best practices and network safety protocols. Protects networked assets through both preventive and reactionary measures.
Equipped with strong problem-solving abilities, willingness to learn, and excellent communication skills. Poised to contribute to team success and achieve positive results. Ready to tackle new challenges and advance organizational objectives with dedication and enthusiasm.
Detail-oriented individual with exceptional communication and project management skills. Proven ability to handle multiple tasks effectively and efficiently in fast-paced environments. Recognized for taking proactive approach to identifying and addressing issues, with focus on optimizing processes and supporting team objectives.
Overview
11
11
years of professional experience
Work History
Senior Security Engineer
Salient Global Technology
08.2024 - Current
Working on the IBM Q RADAR and Log Rhythm, (console & web console) providing operations support at the Security Operations Centre for different firms
Troubleshooting SIEM dashboard issues when there are no reports getting generated or no data available
Managed and resolved high-priority L3 (Level 3) tickets in an ITSM environment, ensuring timely resolution aligned with SLAs
Conduct Vulnerability assessments of Network and Security devices using various tools like NMAP and Burp Suit
Map out a network, discover ports and services running on the different exposed network and security devices
Handling the complete incident management framework cycle right from incident identification, incident containment, performing root cause analysis, suggestion and implementation of preventive and corrective controls and perform network analysis as needed on a case-to-case basis
Analyzing Phishing and Spam related mails using header analysis, Body analysis using various tools and block them in O365
Preparing Weekly and Monthly reports
Will document the tickets with all the action taken for the incident and update it on frequent basis and maintain ticket quality by documenting it with all the required information
Conducted and managed Vulnerability scans using Qualys tool
Identifying critical weaknesses across diverse IT environments
Collaborating with IT teams for patch management and ensures timely deployment of patches and reduce system vulnerabilities
Generating detailed security reports and dashboards, summarizing findings for senior management and stakeholders
Worked with cross-functional teams to address complex issues, including software bugs, infrastructure failures, and security vulnerabilities
Ensured all firewalls, security devices, systems, databases and applications reported data to SIEM and resolved any reporting issues while performing regular health checks
Block listing and whitelisting the Domains, Emails in Email security tool Proof point
Block listing the malicious IPs in Firewalls
Providing USB access request for specific users for business requirement through the requests in the ITSM ticketing tool
Purging the host name if any one leaves the organization in the sentinel one
Blocking the malicious Hash values in the EDR tool
Exposure to Ticketing tool Service Now
Mentored junior engineers, fostering a culture of continuous learning and professional growth within the team.
Spearheaded cloud migration projects, ensuring secure data transfer and storage across all platforms.
Monitored threat intelligence feeds regularly to stay informed about potential risks, proactively addressing vulnerabilities before they could be exploited.
Conducted regular audits of IT infrastructure, ensuring compliance with industry standards and regulatory requirements.
Senior Security Specialist
Skill Mine Technologies
05.2022 - 07.2024
Worked on the IBM Q RADAR and LogRhythm, (console & web console) providing operations support at the Security Operations Centre for different firms
Troubleshooting SIEM dashboard issues when there are no reports getting generated or no data available
Managed and resolved high-priority L3 (Level 3) tickets in an ITSM environment, ensuring timely resolution aligned with SLAs
Facilitated cross-departmental collaboration on security initiatives, fostering a culture of shared responsibility for organizational safety.
Managed a team of junior security specialists, providing guidance and oversight to ensure consistent performance levels.
Conduct Vulnerability assessments of Network and Security devices using various tools
Map out a network, discover ports and services running on the different exposed network and security devices
Handling the complete incident management framework cycle right from incident identification, incident containment, performing root cause analysis, suggestion and implementation of preventive and corrective controls and perform network analysis as needed on a case-to-case basis
Conducted and managed Vulnerability scans using Qualys tool
Identifying critical weaknesses across diverse IT environments
Collaborating with IT teams for patch management and ensures timely deployment of patches and reduce system vulnerabilities
Generating detailed security reports and dashboards, summarizing findings for senior management and stakeholders
Worked with cross-functional teams to address complex issues, including software bugs, infrastructure failures, and security vulnerabilities
Ensured all firewalls, security devices, systems, databases and applications reported data to SIEM and resolved any reporting issues while performing regular health checks
Blacklisting and whitelisting the Domains, Emails in Email security tool Proofpoint
Blacklisting the malicious IPs in Firewalls
Evaluated new technologies and tools for potential integration into existing security infrastructure, maintaining cutting-edge protection capabilities.
Blocking the malicious Hash values in the EDR tool
Exposure to Ticketing tool Service Now
Associate Manager
3i Infotech
04.2020 - 05.2022
Associate in SOC operations for real-time monitoring, analyzing logs from various security/Industrial appliances
Administered various incidents/security alerts triggered in the SIEM tool
Carrying out log monitoring and incident analysis for various devices such as Firewalls, IDS, IPS, databases, web servers, and so forth
Security event analysis and intrusion detection by review and analysis of events generated by various components including IDS/IPS, firewalls, Routers, DB, and various types of security devices
Performed Real-Time Monitoring, Investigation, Analysis, Reporting, and Escalations of Security Events from multiple log sources
Preparing RCA documents and daily/weekly/monthly Reports
Support security incident response processes in the event of a security breach by providing incident reporting
Review software posture and work with operations to plan code version upgrade requirements of supported security and network devices
Automating routine responses to security events to reducing the human intervention
Responsible for managing all aspects of the Vulnerability Risk Management Program including vulnerability identification, analysis, remediation coordination and reporting
Coordinate with Admin team to report vulnerabilities by explaining the exploitation and the impact of the issue
Managing permissions and access to the product
Performing authenticated and unauthenticated vulnerability scanning
Assisting teams with vulnerability resolution, including providing assistance researching vulnerabilities solutions and addressing false positives to reduce system workloads, performing confirmation scans when appropriate, meeting regularly with remediation team, and building reports to provide teams with necessary data
Understanding the incident based on to determine whether it's false or true positive
Collaborated closely with senior management on strategic planning efforts, aligning departmental goals with overarching company objectives.
Remedied issues and conflicts among workers using negotiation and active listening.
Enhanced network security by implementing advanced threat detection and prevention systems
Collaborated with IT teams to integrate security measures into software development life cycles, ensuring secure product releases
Fostered relationships with external partners including law enforcement, fellow industry professionals and intelligence communities to stay informed about latest trends, threats and advancements in the field of cybersecurity
Strengthened risk management strategies by developing comprehensive risk assessments based on current threats facing the organization's industry sector
Conducted regular audits of security infrastructure, identifying weaknesses and recommending improvements
Spearheaded the adoption of industry best practices, resulting in a more robust cybersecurity framework for the organization
Served as a subject matter expert and resource for both technical and non-technical staff on issues related to cybersecurity best practices, incident response and data protection requirements
Prevented costly data breaches by proactively addressing identified vulnerabilities within applications and networks before they could be exploited by malicious actors
Managed vendor relationships to ensure adherence to organizational cybersecurity standards and policies
Led cross-functional teams in establishing disaster recovery plans, minimizing potential data loss during critical incidents
Improved incident response times with the development of comprehensive incident management plans and procedures
Reduced cyber attack risks by conducting thorough vulnerability assessments and penetration testing
Established a culture of shared responsibility for cyber hygiene within the organization through effective communication of policies, procedures and expectations around securing sensitive information
Developed customized cybersecurity training programs to raise employee awareness and minimize human error risks
Oversaw digital forensics investigations following security incidents, uncovering root causes and preventing future occurrences
Conducted security audits to identify vulnerabilities
Developed scalable applications using agile methodologies for timely project delivery.
Managed multiple projects simultaneously while maintaining strict deadlines and high-quality standards.
Maintained comprehensive documentation of development work, facilitating knowledge sharing among team members.
Senior Security Engineer
Phenom People
02.2016 - 12.2017
Reduced cybersecurity risks by regularly conducting vulnerability assessments and penetration tests
Developed customized training programs to educate staff on cybersecurity threats and prevention techniques
Conducted regular audits of existing security infrastructure, identifying areas for improvement and recommending solutions accordingly
Led the migration of critical systems to the cloud while ensuring minimal disruption to business operations and maintaining high levels of security throughout the process
Implemented advanced threat intelligence tools, significantly improving incident detection rates and overall system resilience against Cyber attacks
Established monitoring systems to proactively identify potential weaknesses in cloud infrastructure, enabling early detection of vulnerabilities or breaches
Evaluated third-party vendors for compliance with organizational security standards and industry best practices
Implemented continuous integration and delivery pipelines that incorporated automated security testing at each stage, helping catch vulnerabilities before they could be exploited in production environments
Collaborated with cross-functional teams to develop comprehensive cloud security strategies and policies
Developed risk assessment frameworks tailored specifically for evaluating proposed changes or additions to cloud infrastructure components
Optimized resource allocation for cloud-based infrastructure through careful analysis of usage patterns, resulting in cost savings without sacrificing system performance or reliability
Enhanced cloud security by implementing robust encryption protocols and access control measures
Collaborated with legal and compliance departments to ensure cloud-based solutions adhered to relevant regulations, including GDPR and HIPAA requirements
Maintained up-to-date knowledge of emerging threats and trends in cybersecurity, adjusting strategies as needed to ensure optimal protection
Managed implementation of multi-factor authentication systems, bolstering access control measures across all platforms
Mentored junior engineers, fostering a culture of continuous learning and professional growth within the team.
Spearheaded cloud migration projects, ensuring secure data transfer and storage across all platforms.
Monitored threat intelligence feeds regularly to stay informed about potential risks, proactively addressing vulnerabilities before they could be exploited.
Linux Administrator
IBM
06.2015 - 01.2016
Installation and Configuration SSH, FTP, TELNET AND NFS, DNS, DHCP & IPAM (DDI)
Expertise on different file systems like ext3, ext4, XFS and NFS
Expertise in server troubleshooting and hardening
Coordinating with customers for change management
Installing & removing packages using RPM & YUM; contributing to kernel patching by using satellite server
System Administration, maintenance and monitoring various day-to-day operations
Adding route entries for accessing servers from different zones & executing system administration, maintaining & monitoring various day-to-day operations
Performing patch upgradation and OS upgradation as per vendor or customer requirements & automating job for various tasks using CRON & AT
Securing the servers as per organization's policies & providing L1, L2 & L3 level support to the customer on all Linux server issues as per SLA
Expertise in LINUX / UNIX system builds, administration, Installations, Upgrades, Troubleshooting on different distributions such as Ubuntu, CentOS, RHEL
Resolving the hardware issues (DIMM, Hard disk) on data center for physical servers
Expertise in user & group management, disk partitioning (LVM) and working experience in large-scale enterprise development environment
Utilize tools like top, htop, iostat, and vmstat to monitor CPU, memory, disk I/O, and network usage
Developed custom shell scripts for system monitoring and automation, improving response times to incidents
Provided 24/7 support for critical production systems, reducing average incident resolution
Spearheaded a migration project to RHEL 8, resulting in enhanced system security and performance
Recognized for leading a team in a successful data center consolidation, reducing operational costs
Analyze output to identify bottlenecks, such as high CPU load or excessive swapping
Adjust kernel parameters using sysctl to optimize performance
Use tune2fs to adjust filesystem parameters, such as enabling journaling or optimizing block sizes based on application needs
Implement RAID configurations (e.g., RAID 0, RAID 1, or RAID 10) to improve disk performance and redundancy
Use ulimit to manage resource limits for users and processes
Tune caching parameters for applications (e.g., database caching) to reduce disk I/O
Analyze CPU, memory, and storage trends to forecast future needs
Identify thresholds for CPU, memory, and disk I/O before performance degradation occurs
Maintain documentation of capacity planning processes and decisions for future reference
Regularly report on system performance and capacity forecasts to stakeholders for informed decision-making
Developed and conducted training programs for junior staff on RHEL best practices and troubleshooting techniques
Configure Private DNS Zone to resolve private FQDN of PaaS services with endpoint IP
Create VNET and Subnet as per application tier (tier 2 and tier 3) such as Web Zone, APP Zone and DB Zone
Managing SN Tickets based related to deployment, troubleshoot the issue, enabling the backup, costing for services (IaaS and PaaS)
Configure and enable backup as per backup policy and retention period (daily, weekly, monthly and yearly) for VMs
Sharing cost estimates of IAAS and some PAAS component
Check connectivity traffic IN and OUT from subnet using NSG and UDR
Check connectivity issue along with respective stake holder (Security FW team and On-prem FW team)
Creating and managing Infra of cloud as per application architecture
Deployment of an Azure VM (Windows server and Linux server) using custom or golden hardens images or marketplaces
Monitoring Azure VM alerts using Metrics & Action Groups
Troubleshooting Azure VM issues with the help of Boot Diagnostics, Serial Console, Redeploy, Guest diagnostics
Create an Azure Virtual network in Azure portal and Configure Virtual networks connectivity using VET peering
Create and manage VM scale set and enable auto-scaling, spinning image reference using image definition of image server
Configuration of Traffic manager, Load balancer and Application Gateway Load Balancer
Building & releasing Ec2 instances Amazon Linux & Oracle Linux, Redhat and Windows for POC, Development and Production environment; setting up & attaching & detaching storage volumes to OCM instances & EBS volumes to Ec2 instances
Troubleshooting all network related issues, file system problems and server troubleshooting & hardening
Managed backup and disaster recovery through strict data control and retention policies, personally handling recovery tasks when issues arose.
Established comprehensive disaster recovery plans that safeguarded valuable company data and ensured rapid system restoration in the event of a catastrophic failure.
Implemented effective monitoring solutions, allowing for rapid identification and resolution of potential issues before they impacted endusers.
Senior Associate
HCL Info Systems
04.2014 - 05.2015
Created and serviced administrator and user accounts on Linux-based systems, managing deployments
Managed backup and disaster recovery through strict data control and retention policies, personally handling recovery tasks when issues arose.
Tuned system performance to optimize efficacy of new and existing hardware components.
Installed system-wide hardware components, confirming inter-operation and compatibility with Linux-based software destroys.
Coordinated cross-site installation of networked systems, confirming post-install connectivity.
Maintained smooth operation of multi-user computer systems through collaboration with hardware and network engineers.
Interacted directly with users to diagnose and correct major system issues and address concerns.
Managed virtualization platforms, optimizing resource allocation to maximize system performance across diverse workloads.
Optimized network connectivity by configuring firewalls, switches, routers, and other networking devices within the Linux environment.
Supported end-users effectively managing issues related to Linux-based systems and applications in a timely manner
Maintained high availability of Linux servers through vigilant monitoring, preventive maintenance, and rapid issue resolution.
Enhanced system performance by optimizing configurations and implementing best practices for Linux administration.
Implemented and maintained virtual private networks
Analyzed network traffic and performance metrics to optimize system performance.
Researched and recommended new technologies and strategies for improving system performance
Completed reports detailing network and systems performance and downtime issues.
Installed important security and functionality patches to maintain optimal protections against intrusion and system reliability.
Streamlined operational efficiency by identifying areas for improvement and proposing actionable solutions.
Effectively managed multiple competing priorities while maintaining focus on delivering exceptional results for clients and the organization.
Education
Master of Science - Computer Science
Osmania University
India
06.2011
Bachelor of Science - Computer Science
Kakatiya University
Hyderabad, India
06-2008
Skills
FortiGATE
IDS/IPS
Qualys
Nessus
SentinelOne
Crowd Strike
LogRhythm
IBM QRadar
Palo Alto
Splunk Phantom
Proofpoint
Forcepoint
AWS, Azure, GCP, OCI
ISO27001
HIPAA
Penetration testin
Identity and Access management
Two-factor authentication implementation
Penetration testing skills
Operating system hardening
Threat intelligence analysis
Incident response management
Cloud security management
Vulnerability assessment expertise
Vulnerability assessment
Incident response
Patch management
SIEM provider management
Threat analysis
Cloud security
Risk assessment
Incident reporting
Incident management
Timeline
Senior Security Engineer
Salient Global Technology
08.2024 - Current
Senior Security Specialist
Skill Mine Technologies
05.2022 - 07.2024
Associate Manager
3i Infotech
04.2020 - 05.2022
Senior Software Engineer
Wipro LTD
12.2017 - 04.2020
Senior Security Engineer
Phenom People
02.2016 - 12.2017
Linux Administrator
IBM
06.2015 - 01.2016
Senior Associate
HCL Info Systems
04.2014 - 05.2015
Master of Science - Computer Science
Osmania University
Bachelor of Science - Computer Science
Kakatiya University
Similar Profiles
Venkateswararao VelpulaVenkateswararao Velpula
Senior Security & Linux Engineer at Salient Global TechnologySenior Security & Linux Engineer at Salient Global Technology