Skills
Systems Admin, Network, Cybersecurity, Analytical Reporting, Cloud environment, Database and Project Management.
About
To Develop my Career as a Cybersecurity Professional in an Information Technology based
Organisation, Where I will be a valuable Team Member, Contributing Quality Ideas and Work.
● As a Cybersecurity professional with about 5 yrs. of exp. in Mobile, OS, Cloud, Network, and
Web application security, and 6 yrs. exp of IT Desktop support.
● I have a proven track record of using my excellent personal, communication, and
organizational skills to lead and improve IT security.
● Knowledge on Security frameworks (ISO 27001, NIST, MITRE ATT&CK, CIS, CSA)
● Experience in IT and IT security operations with broad exposure to
Infrastructure/Network/ITSecurity tools, Security incident response, and remediation.
● Experience in Vulnerability remediation, tracking and closures from multiple stakeholders.
● Capable of tracking, analyzing, escalating, and remediation of vulnerabilities in an enterprise
environment.
● Experience and knowledge with Vulnerability assessment tools – Nmap, SQLmap, Nessus
Security Centre, Nexpose, Qualys, and IBM AppScan.
● Extensive knowledge of IDS/IPS Sourcefire, Snort.
● Profound knowledge and Experience in Vulnerability Management and Penetration Testing.
● Proficient in understanding application-level vulnerabilities like XSS, SQL Injection, CSRF,
authentication bypass, cryptographic attacks, authentication flaws, etc.
● Cyber Security Architecture review and threat modeling.
● Hands-on experience in Dynamic and Static Application Malware analysis.
● Proven track record of delivering tasks on time and to the company’s satisfaction.
● Experience with search engines such as Metasploit, Core Impact, and Kali Linux.
● Managed threat intelligence, threat hunting (IOC vs. TTP), Forensics, data protection, EDR,
email security, cloud security, malware analysis, and reverse engineering.
● Deployed multiple threat management, security event and correlation monitoring, and IDS and
NAC devices for a client.
● Conducted threat management procedures, vulnerability scans, and penetration testing to
identify system vulnerabilities.