About
Seasoned Security Engineer with around 5 years of practical experience in incident response, digital forensics, and threat mitigation across diverse enterprise environments. Expert in leading high-stakes investigations, uncovering system vulnerabilities, and deploying resilient security frameworks to protect critical infrastructure. Known for partnering with executive leadership to craft and implement cybersecurity strategies that align seamlessly with organizational objectives and drive long-term resilience.
Skills & Expertise (6)
Work Experience
Security Associate
Capgemini
10-2020 - 11-2025
Experience in creating and maintaining the daily, weekly, and monthly reports of device health status using Defender ATP. Good hands-on experience in creating the SOPs, playbooks, and runbooks using Splunk and Defender, as well as hands-on experience in creating and managing the endpoint health check reports and vulnerability reports to reduce the exposure score. Configure and manage dashboards, notebooks, data connectors, and playbooks in Azure Sentinel. Hunt security threats using Azure Sentinel. In-depth knowledge of endpoint protection (AV, HIPS, and DLP). Good hands-on experience in managing the P1 bridge call, involving the stakeholders, and experience in creating the incident response report for critical incidents. Experience in handling and deploying the Defender agents onto servers to onboard into Defender, and troubleshooting agent connectivity issues using the MDE Client Analyser. Taking the appropriate action based on advisories, IOCs, identifying threat actors using Mitre ATT&CK, and coordinating with the respective team to block the IOCs. Hands-on experience in analysing phishing emails and malware emails, performing soft deletes and hard deletes of malicious emails from the email cluster, and adding indicators into the tenant allow list, block list, and based on analysing the IOCs. Knowledge of Group Policy Objects, Active Directory security and compliance configurations, and migrating to the Intune administrator console. Experience in working on host isolation and advanced threat analysis using EDR and Microsoft Defender ATP.
Security Associate
Capgemini
10-2020 - 11-2025
Experience in creating and maintaining the daily, weekly, and monthly reports of device health status using Defender ATP. Good hands-on experience in creating the SOPs, playbooks, and runbooks using Splunk and Defender, as well as hands-on experience in creating and managing the endpoint health check reports and vulnerability reports to reduce the exposure score. Configure and manage dashboards, notebooks, data connectors, and playbooks in Azure Sentinel. Hunt security threats using Azure Sentinel. In-depth knowledge of endpoint protection (AV, HIPS, and DLP). Good hands-on experience in managing the P1 bridge call, involving the stakeholders, and experience in creating the incident response report for critical incidents. Experience in handling and deploying the Defender agents onto servers to onboard into Defender, and troubleshooting agent connectivity issues using the MDE Client Analyser. Taking the appropriate action based on advisories, IOCs, identifying threat actors using Mitre ATT&CK, and coordinating with the respective team to block the IOCs. Hands-on experience in analysing phishing emails and malware emails, performing soft deletes and hard deletes of malicious emails from the email cluster, and adding indicators into the tenant allow list, block list, and based on analysing the IOCs. Knowledge of Group Policy Objects, Active Directory security and compliance configurations, and migrating to the Intune administrator console. Experience in working on host isolation and advanced threat analysis using EDR and Microsoft Defender ATP.
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Current Company
Other
Visa Status
No Visa
Relocation
Open to Relocation