Skills
Technical Skills
Cloud Security, Directory Services, Email Security, Endpoint Security, Network Security, SIEM, Threat
Intelligence, Vulnerability Management, Web Application Security, Compliance and Regulatory
Frameworks, Incident Management, Authentication, AWS, Azure, GCP, Cloud Security Platforms, Active
Directory, LDAP, SAML, MS Exchange, Email Gateway Security, Email Encryption, Endpoint Security
Management, CrowdStrike EDR, Carbon Black EDR, Microsoft Defender for Endpoint, Network Security
and Monitoring, LAN/WAN technologies, TCP/IP stack, OSI Layer, Network Segmentation, Micro
segmentation, SIEM Administration, SIEM Monitoring, IBM Qradar, ELK, Splunk, LogRhythm, Threat
Hunting, Recorded Future, ThreatConnect, IntSights, ThreatQuotient, Anomali, Vulnerability Identification,
Vulnerability Assessment, CyberArk Privileged Access System and password vault, Vulnerability
Prioritization, PAM/PIM concepts and best practices, Identity and Access Management (IAM), Vulnerability
Mitigation, Qualys, Nexpose, Nessus, Open Web Application Security Project (OWASP), Security standards
(TIS, PIM/PAM benchmarks), Burp Suite, ZAP, NIST, HIPAA, PCI, GDPR, ISO 27001, PIPEDA, Incident
Response, Incident Triage and Analysis, Multi-Factor Authentication (MFA), Zero Trust Architecture,
Security Frameworks (MITRE, NIST, Cyber Kill Chain), Penetration Testing (Metasploit, Burp Suite, ZAP),
IDS/IPS (Suricata, Snort, Bro, Security Onion), Linux (Ubuntu, Kali, Parrot, CentOS, Debian), Virtualization
(VMware, VirtualBox, Hyper-V), Office 365 Security, Palo Alto XDR.
Soft Skills
• Communication: written and verbal
• Teamwork and collaboration
• Problem-solving and analytical thinking
• Time management and organization
• Adaptability and flexibility
• Leadership and initiative
• Continuous learning and professional development
• Attention to detail and quality
• Customer-focused and service-oriented
Language Proficiency: English: Fully Proficient | Malayal
About
I have a solid background in information security and cybersecurity, with over 3 years of experience in roles focused on threat analysis, incident response, and security operations. Over the years, I’ve gained hands-on experience with various security tools, like endpoint detection and response systems, SIEM platforms, and threat intelligence platforms, which have allowed me to analyze and respond to security incidents effectively.