About
Currently with 4 years of experience with multiple departments as Global Defense Cyber Security operations, Incident Response, Security Engineering, Automation experience for providing cross functional services in Network Security, Information security and related field. Strong Knowledge all cross functions of Defensive cyber security roles, along with well skilled at scripting and API integrations.
Skills & Expertise (43)
Work Experience
Security Analyst
Teleperformance
Jun 2023 - Present
Managed Cyber Security operations/Incident response including event monitoring which includes incident detection/response/mitigation for in house security projects. Operations incudes threat hunting, Host analysis, malware analysis. Splunk and CrowdStrike Next-Gen SIEM: event monitoring which includes incident detection, investigation and remediation. Tracking and analyzing on real time use cases and creating basic rules for SIEM, report generation. Work experience with Crowd strike EDR with isolation and containment as per MITRE framework, parent-child process relation investigations for all types of detection/response of incidents. Creation of SOAR workflows to automate the initial triage of L1 Analyst investigations to different channels like Teams, slacks, PagerDuty etc. Build Security program for engineering department, implementation/Automation including, Integration from multiple data log sources, like Crowd strike NextGen SIEM and Google Workspace. Administration of SIEM (Crowd strike NextGen SIEM) end to end with sensor deployment, host group management, upgradations, policy creations, Correlation rules for threat detections, fine tuning of alerts, etc. Install CrowdStrike agents across endpoints and perform health checks, Troubleshoot, installation, connectivity, and agent-related issues etc. Provide end to end incident handling support on any escalations from peer’s departments or stakeholders or security operations team, with full investigation response/mitigation and lesson learning with tabletop exercises. Perform Advanced Threat Hunting for any true security incidents and take action to block in all security devices and track down the infected system. Perform Malware Analysis, Sandboxing (Threat Grid, Hybrid Analysis) when required. Delivery of test stimulations of any pre-production of security solutions. Documentation of any new playbooks or solutions or responses when needed. Built custom CISO report for any possible daily major incident. Building new use cases when required as per lesson learnt from the True Incident/breach.
Security Trainee
Grassroots Solutions Pvt Ltd.
Feb 2022 - Nov 2022
Manage and operate Security operation and Cyber Security Incident Response (CSIRT)/implementation including event monitoring which includes incident detection/response/mitigation for in house Grassroots security projects based on NIST framework. Triage of security Alerts from multiple sources based on severity and investigate incoming alerts to distinguish between 'false positives' and genuine security threats. Phishing Mails processing and actions with respective service till the containment. Incident Response: Execute immediate containment actions when a compromise is confirmed (e.g., isolating infected hosts, blocking malicious IP addresses, or disabling compromised user accounts). Reporting & Documentation: Create detailed 'post-mortem' reports after incidents to document the root cause and improve future defense strategies. Vulnerability Management: Perform regular scans to identify weak points in the infrastructure and coordinate with IT teams to apply patches.
Analyst
Zavetech Business Solutions PVT LTD
Feb 2021 - Nov 2021
Managed operations at SOC including event monitoring which includes incident detection, tracking and analyzing on real time use cases, report generation, which included supporting almost more than 4 clients, and was part of end point security EPS for almost a year. SOC – Information Security operation center: Was part of security operations project from scratch, for specifically for SIEM, it includes understanding of wide network, preparing use cases, was also part of creating SIEM basic rules, fine-tuning of false positives, proactive hunting on vulnerabilities using Qualys guards, and all other operations of SOC.
Education
BSc Animation - Bharathiar University, IIFA Lancaster Degree College
- 2020 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation