About
You should hire me because I bring a solid combination of hands-on experience and advanced academic knowledge in cybersecurity. With over 3 years in a multi-tiered SOC, a Master’s in Cybersecurity and Digital Forensics, and real-world expertise in EDR, SIEM, firewalls, and threat detection frameworks like MITRE ATT&CK, I can contribute from day one. I’ve handled incident response, vulnerability management, and malware analysis across on-prem and cloud environments. I’m detail-oriented, proactive, and constantly learning to stay ahead of emerging threats—qualities essential for any high-performing security team.
Skills & Expertise (3)
Work Experience
Associate Consultant
Aujas
9-2022 - Present
• Hands-on experience with Azure Firewall, including implementation of URL whitelisting, traffic filtering policies, and custom rule sets to enforce network segmentation and control outbound/inbound traffic. • Managed endpoint security using Microsoft Defender for Endpoint and VMware Carbon Black Cloud XDR, ensuring compliance and continuous monitoring, threat detection, and automated response across enterprise endpoints. • Performed Indicator of Compromise (IoC) blocking across security layers by ingesting threat intelligence feeds and advisories, and applying proactive countermeasures to prevent lateral movement and data exfiltration. • Executed vulnerability management processes by conducting Nessus scans aligned with real-time threat intelligence and advisories to prioritize, track, and remediate critical security gaps in both on-prem and cloud environments. • Proven experience applying MITRE ATT&CK and Cyber Kill Chain methodologies to track adversaries, map attack lifecycles, and enhance incident detection and response strategies across enterprise environments. • Skilled in OWASP Top 10 vulnerability remediation, TTP-based threat hunting, and Indicators of Compromise (IoC) enrichment to proactively detect, respond to, and mitigate sophisticated threats. • Hands-on experience in installing, managing, and deploying security agents on both on-premises and AWS cloud infrastructures to enable SIEM integration, log forwarding, and centralized threat visibility. • Strong expertise in static and dynamic malware analysis, reverse engineering, and behavioral analysis to understand attack mechanisms and develop defensive countermeasures against evolving threats. • Experienced in installing, managing, and deploying security agents across on-prem and (AWS) cloud servers, for SIEM monitoring, log forwarding, and security visibility. • Strong expertise in Code Analysis, Malware Analysis, Behavior Analysis, and Reverse Engineering to understand malicious activity and develop countermeasures.
Cybersecurity Analyst
Terralogic Software solutions
3-2022 - -
• Conducted ransomware analysis by identifying initial attack vectors, analyzing payload behavior, and developing tailored mitigation and containment strategies to prevent reinfection. • Utilized LogRhythm SIEM, UEBA, and SOAR platforms to automate threat detection, incident response workflows, and reduce mean time to respond (MTTR). • Operated Endpoint Detection & Response (EDR) tools such as Cylance and Kaspersky for threat hunting, incident investigation, and real-time remediation across enterprise endpoints. • Performed comprehensive vulnerability assessments using Nmap, Metasploit, Nessus, and Burp Suite to identify system, network, and application-level security weaknesses. • Delivered detailed Vulnerability Assessment and Penetration Testing (VAPT) reports with risk-based scoring, technical impact analysis, and prioritized remediation strategies to stakeholders.
Education
Master in Cybersecurity and Digital Forensic
2020 - 2022 · India
Certifications
Certified Cloud security engineer
EC-Council · 2025
Learnt about AWS, AZURE and GCP Certification