About
Highly skilled and dedicated cyber security Analyst with a passion for protecting organization from Cyber threats. Proficient in conducting vulnerability assessments analyzing network traffic and responding to security incidents. Adapt to stay ahead of emerging cyber threats and implementing effective defensive strategies. Strong Problem solving and continuous learning and development in cyber domain.
Skills & Expertise (7)
Work Experience
Quality Assurance Engineer
Rabwin Industries Private Limited
9-2020 - 4-2022
1. Maintaining and updating Customer Drawings. 2. Inspecting the component as per the customer drawing tolerances. 3. Preparing the First Information Report as per the Customer Drawings. 4. 8D Form is given to represent department, it is given when the Component fails to meet the Customer Drawing Tolerances. 5. 8D Form is followed and maintained weekly. 6. Closing the Stock of the inspected component through SAP. 7. Verifying the dispatch list to Dispatch the Component.
Internship
Maxbyte Technology Private Limited
7-2024 - Present
1. Hands-on expertise in building robots and integrating sensors with Raspberry Pi. 2. Understanding of power management systems. 3. Strong debugging and troubleshooting capabilities in hardware and software. 4. Knowledge of hardware platforms like ESP32, RaspberryPi3 and PCA9685. 5. Hands-on experience in Phishing & URL Analysis to detect the Malware.
Graduate Apprentice Trainee
Airports Authority Of India
3-2019 - 3-2020
1. Lost and found Item Maintaining, Documenting and Uploading to public through web portal. 2. Clearing the public grievances faced on the Airport. 3. Every day inspection on Airport premises (FIDS, CIFS Tools, Fire Extinguisher). 4. Validating and monitoring the Flight schedules of summer and winter. 5. We play protocols for the VVIP's (President of India, Governors, PM, CM, Chief Justice, IAS & IPS etc.) 6. Updating & Maintaining the Flight Bills monthly. 7. Updating the revenue wages of people working in the Airport monthly through SAP.
Quality Assurance Engineer
Rabwin Industry Private Limited
09-2020 - 04-2022
Worked in Quality Department maintaining and updating customer drawings, inspecting components, preparing reports, and managing stock through SAP.
Quality Assurance Engineer
Rabwin Industry Private Limited
09-2020 - 04-2022
Worked in Quality Department ensuring compliance with customer drawings and standards.
Intern
Maxbyte Technology Pvt Ltd
07-2024 - Present
Hands-on expertise in building robots and integrating sensors with Raspberry Pi, understanding power management systems, and strong debugging capabilities.
Intern
Maxbyte Technology Pvt Ltd
07-2024 - Present
Hands-on expertise in building robots and integrating sensors with Raspberry Pi.
SOC Analyst
Center for Internet Studies & AI
03-2023 - 04-2023
Worked on real-time event logs and investigation.
SOC Analyst
Center for Internet Studies & AI
03-2023 - 04-2023
Worked on Real time event logs & Investigation.
Graduate Apprentice Trainee
Airport Authority of India
03-2019 - 03-2020
Worked in Ops Department handling various responsibilities including maintaining lost and found items, clearing public grievances, inspecting airport premises, validating flight schedules, and updating flight bills and revenue wages.
Graduate Apprentice Trainee
Airport Authority of India
03-2019 - 03-2020
Worked in Ops Department handling various responsibilities including lost and found, public grievances, inspections, and flight schedule validations.
Education
Master Of Technology in Robotics & Automation
2023 - 2025 · India
Cyber Security Certification from SOC Experts and National Institute Of Electronics and Information Technology
2022 - 2023 · India
Bachelor Of Engineering in Mechanical Engineering
2014 - 2018 · India
Certifications
FCF - Getting Started in Cybersecurity 2.0 Self-Paced
Fortinet · 2025
1. Overview of cybersecurity and its core principles 2. Understanding cyber threats and attack types 3. Basics of networking and internet security 4. Introduction to malware, phishing, and social engineering 5. Fundamentals of identity and access management 6. Basics of encryption and data protection 7. Overview of firewalls, antivirus, and endpoint security 8. Introduction to security monitoring and incident response 9. Cybersecurity best practices and risk management 10. Awareness of ethical, legal, and compliance considerations
FCF - Introduction to the Threat Landscape 2.0 Self-Paced
Fortinet · 2025
1. Overview of the current cyber threat landscape 2. Understanding different types of cyber threats and attacks 3. Introduction to threat actors and their motives 4. Common attack vectors and techniques 5. Basics of malware, ransomware, and phishing 6. Understanding indicators of compromise (IOCs) 7. Introduction to threat intelligence concepts 8. Awareness of emerging threats and trends 9. Cybersecurity best practices to mitigate threats 10. Basics of incident response and reporting
Cyber security Fundamentals
IBM · 2024
1.Overview of cybersecurity principles and objectives 2.Understanding common cyber threats and attack types 3. Basics of network and endpoint security 4. Introduction to malware and phishing attacks 5. Fundamentals of cryptography and data protection 8. Identity and access management concepts 9. Security operations and incident response basics 10. Risk management and security controls 11. Introduction to security policies and compliance 12. Cybersecurity career paths and ethical practices
Getting started with Threat Intelligence and Hunting
IBM · 2024
1. Overview of threat intelligence concepts. 2. Types of threat intelligence (strategic, tactical, operational). 3. Understanding indicators of compromise (IOCs). 4. Threat actor tactics, techniques, and procedures (TTPs). 5. Introduction to threat hunting methodology. 6. Using logs and telemetry for investigations. 7. Basics of hypothesis-driven threat hunting. 8. Understanding malware and phishing indicators. 9. Introduction to MITRE ATT&CK framework. 10. Reporting and documenting threat findings.
QRadar SIEM Foundation
IBM · 2024
1. Overview of IBM QRadar SIEM platform 2. Understanding log sources and event collection 3. Event normalization and correlation basics 4. Offense creation and lifecycle 5. Rule types and correlation concepts 6. Network flows and flow analysis 7. Asset and vulnerability integration 8. Dashboards and basic reporting 9. Alert investigation and triage fundamentals 10. SOC workflow and incident response basics
Cyber Threat Management
CISCO · 2024
1. Overview of cyber threat management concepts 2. Understanding common cyber threats and attack vectors 3. Network security monitoring fundamentals 4. Intrusion detection and prevention basics 5. Malware and phishing attack analysis 6. Log analysis and alert investigation 7. Incident response lifecycle and procedures 8. Threat intelligence usage and correlation 10. Security policies and risk mitigation 11. Best practices for protecting enterprise networks
Cybersecurity
Skill India - Tech Mahindra Foundation · 2024
1. Introduction to cybersecurity and its importance 2. Understanding common cyber threats and attacks 3. Basics of networking and internet security 4. Malware types and prevention techniques 5. Fundamentals of firewalls and antivirus solutions 6. User authentication and access control concepts 7. Introduction to encryption and data protection 8. Cybersecurity best practices for individuals and organizations 9. Basic incident response and reporting 10. Awareness of ethical and legal aspects of cybersecurity
Cyber security Trainee
National Institute Of Electronics and Information Technology · 2023
1. Solid understanding in network concepts and security concepts. 2. Good knowledge on protocols, event logs, cyberattacks, attack vectors, malware analysis etc. 3. Good Knowledge on security solutions like firewall, IPS, Email gateway, Antivirus. 4. Basic Exposure on frameworks & compliance like cyber kill chain. 5. Good Knowledge on MITRE Att&ck, phishing email, CIA, AAA, DLP, Defense in Depth, Endpoint Security. 6. Deep Drive analysis of triggered alerts using SIEM & Other tools. 7. Good understanding on SOC Process like monitoring, analyzing, reporting. 8. Acknowledging & closing false positive & raising tickets for validated incidents. 9. Follow up with incident response team for remediation. 10. Hands on experience in making report, dashboard, alerts in Splunk for preventing the cyber-attack.
Getting Started with AWS Security, Identity and Compliance
AWS · 2023
1. Overview of AWS shared responsibility model 2. Understanding AWS Identity and Access Management (IAM) basics 3. User, group, role, and policy concepts 4. Authentication and authorization in AWS 5. Introduction to AWS security best practices 6. Basics of network security in AWS 7. Understanding AWS compliance programs 8. Introduction to logging and monitoring in AWS 9. Awareness of AWS security services * Fundamentals of data protection in the cloud
Cyber Threat Intelligence 101
Arc X · 2023
1. Introduction to cyber threat intelligence concepts 2. Understanding the CTI lifecycle 3. Types of threat intelligence and use cases. 4. Indicators of compromise (IOCs) 5. Adversary tactics, techniques, and procedures (TTPs) 6. Threat actor profiling basics 7. Open-source intelligence (OSINT) fundamentals 8. Intelligence analysis and prioritization 9. Reporting and communicating threat intelligence 10. CTI integration with SOC and security operations
SOC Analyst Trainee
SOC Experts · 2022
1. Solid understanding in network concepts and security concepts. 2. Good knowledge on protocols, event logs, cyberattacks, attack vectors, malware analysis etc. 3. Good Knowledge on security solutions like firewall, IPS, Email gateway, Antivirus. 4. Basic Exposure on frameworks & compliance like cyber kill chain. 5. Good Knowledge on MITRE Att&ck, phishing email, CIA, AAA, DLP, Defense in Depth, Endpoint Security. 6. Deep Drive analysis of triggered alerts using SIEM & Other tools. 7. Good understanding on SOC Process like monitoring, analyzing, reporting. 8. Acknowledging & closing false positive & raising tickets for validated incidents. 9. Follow up with incident response team for remediation. 10. Hands on experience in making report, dashboard, alerts in Splunk for preventing the cyber-attack.
NSE 1 Network Security Associate
Fortinet · 2022
1. Understanding what cybersecurity is and why it is important for protecting networks and data. 2. Knowledge of the CIA triad: confidentiality, integrity, and availability. 3. Basics of computer networking including LAN, WAN, and common network devices. 4. Awareness of IP addressing and fundamental network communication concepts. 5. Identification of common cyber threats such as malware, ransomware, phishing, and social engineering attacks. 6. Understanding network-based attacks like DoS, DDoS, man-in-the-middle, spoofing, and eavesdropping. 7. Familiarity with basic security technologies such as firewalls, antivirus, and IDS/IPS. 8. Understanding user authentication methods and password security best practices. 9. Awareness of multi-factor authentication and access control concepts. 10. Basic understanding of encryption and secure communication methods. 11. Knowledge of data protection and privacy fundamentals. 12. Awareness of endpoint security and basic network security practices. 13. Understanding the importance of patch management, backups, and recovery. 14. Basic knowledge of security monitoring, logs, and incident response concepts. 15. Awareness of cybersecurity ethics, policies, and career roles.
NSE 2 Network Security Associate
Fortinet · 2022
1. Fortinet Security Fabric overview 2. Introduction to Fortinet products and solutions 3. Basics of next-generation firewall concepts 4. Fundamental network security services 5. Endpoint security awareness 6. Threat protection fundamentals 7. Intrusion prevention basics 8. VPN and secure connectivity concepts 9. Cloud security awareness 10.Centralized management and monitoring 11. Logging and reporting fundamentals 12. Integrated security best practices
Intro to Splunk
Splunk · 2022
1. Overview of Splunk platform and its use cases 2. Understanding machine data and log ingestion 3. Basic Splunk architecture and components 4. Navigating Splunk Web interface 5. Searching data using SPL basics 6. Using fields, filters, and time ranges 7. Creating simple reports and dashboards 8. Understanding indexes and data sources 9. Basic alerting concepts 10. Introduction to data visualization in Splunk
AWS Networking Basics
AWS · 2022
1. Overview of AWS global infrastructure. 2. Understanding Amazon VPC fundamentals. 3. Subnets, CIDR blocks, and IP addressing. 4. Route tables and internet gateways. 5. Security groups and network ACLs. 6. Public vs private subnets. 7. Basics of NAT gateways and instances. 8. VPC peering and connectivity concepts. 9. Introduction to load balancing. 10. Fundamental AWS networking best practices.
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
No Visa
Relocation
Open to Relocation