About
I'm currently immersed in the dynamic world of cybersecurity, where I've been honing my skills and expertise for the past year. I bring a robust foundation in addressing security incidents, harnessing the power of SIEM tools, and navigating the intricacies of EDR/XDR/MDR technologies. My expertise extends to proficiently analyzing logs and exhibiting a burgeoning interest in the nuanced craft of malware hunting. Fueled by an insatiable appetite for learning, I possess an innate ability to swiftly adapt to emerging technologies and tools, ensuring I stay ahead of evolving threats and industry trends.
Security Incident Responder
Hello! I'm a Security Engineer-1 currently immersed in the dynamic world of cybersecurity, Within this realm, I've delved into various facets, specializing in handling security incidents, harnessing the capabilities of SIEM tools, navigating through the complexities of EDR/XDR/MDR technologies, and conducting meticulous log analysis. Additionally, I've cultivated a burgeoning interest in the intriguing pursuit of malware hunting. My ability to quickly grasp and adapt to new technologies and tools has been a cornerstone of my journey thus far. This adaptability not only enables me to stay abreast of emerging threats but also positions me to effectively address evolving security challenges. Driven by a strong sense of self-motivation and enthusiasm, I am deeply committed to leveraging my skills and knowledge to garner practical work experience in the cybersecurity domain. I am eager to continue expanding my expertise while making meaningful contributions to the cybersecurity landscape.
Skills
Technical skills are the specialized knowledge and expertise required to perform specific tasks and use specific tools and programs in real world situations. Diverse technical skills are required in just about every field and industry, from IT and Finance to health care and education.
Resume
Industry Experience
STRATOGENT - Security Engineer-1
Bengaluru, India - Hybrid Aug'23 - Present
As a security engineer with one year of experience in the healthcare domain, I have dedicated myself to safeguarding sensitive data and protecting critical systems against a myriad of threats.
- Analyzing and promptly responding to security alerts in 24x7 environments.
- Providing End-to-End support to US clients and Troubleshooting of issues as a L1 Engineer.
- Supporting the L2 engineers during P1 & P2 incidents.
- Conducting comprehensive security assessments and validations on monthly basis
- Addressed potential security threats by conducting detailed log checks for incidents.
- Resolving customer security inquiries and concerns.
- Optimized custom alerts detection rules by crafting LEQL queries, resulting in a 100% improvement in alert accuracy.
- Implemented a honeypot in the production environment, bolstering their cybersecurity strategy by 25% and fortifying defenses against potential threats.
- Troubleshooting and escalating the issues if needed without breaching the SLAs.
- Documented and maintained runbooks, reducing response time by 30% and increasing incident resolution accuracy by 20%.
- Participating in the weekly & monthly Knowledge Sessions.
- Proposed analysis of suspected and client-requested restore emails, reducing phishing incident workload by 90%.
Internship Experience
BETSOL - software Developer Intern
Aug/2022 - Sep/2022
Banshankari, Bengaluru, KA - On-Site
- Debugged software code, identifying and rectifying bugs and errors by 40% using IntelliJ Idea Debugger.
- Performed Load Testing for Login module, achieving a peak user load of 720 on the page using Apache JMeter.
- Created comprehensive documentation for the intern program, ensuring 100% utilization for upcoming interns.
- Collaborated with development team to resolve issues, resulting in a 10% improvement in issue resolution efficiency.
- Participated in the weekly meeting and implemented necessary system adjustments.
Education
Bachelor of Engineering (BE), ISE
2019 - 2023
CGPA - 8.41
SJB Institute of Technology, Bengaluru, KA, INDIA
HSC/intermediate
2017 - 2018
Percentage - 87.8%
Kendriya Vidyalaya IIT Kanpur
Activities and societies: position-House captain Sports Team member & Cultural Co curricular Activities (CCA)- Organiser
SSC/HighSchool
2015 - 2016
Percentage - 85.5%
Kendriya Vidyalaya IIT Kanpur
Tech Stack
In cybersecurity, a tech stack comprises a set of security tools, frameworks, and protocols utilized to fortify digital assets against cyber threats. It encompasses tools for threat detection, incident response,ensuring comprehensive protection of sensitive data and systems. A robust tech stack in cybersecurity is crucial for mitigating risks, maintaining regulatory compliance, and safeguarding against evolving cyber threats.
Rapid 7
The Rapid7 Insight Platform collects data from across your environment, making it easy for teams to manage vulnerabilities, monitor for malicious behavior, investigate and shut down attacks, and automate your operations.
CrowdStrike Falcon
The CrowdStrike Falcon platform is designed as a highly modular and extensible offering that helps customers solve new security challenges with a single click and without the need to re-architect or re-engineer the architecture, removing friction associated with security deployments. Next-gen antivirus, EDR, and XDR.
Defender 365
Microsoft Defender for Office 365 helps organizations secure their enterprise with a comprehensive slate of capabilities for prevention, detection, investigation and hunting, response and remediation, awareness and training, and achieving a secure posture.
SentinelOne
SentinelOne protects your computer and data with anti-malware and anti-exploit protection. The SentinelOne agent continually receives intelligence updates from SentinelOne servers. The agent is very lightweight on resources and offers minimal to no impact on work.
Mimecast
Mimecast provides your organization with security, continuity and archiving cloud services in a mail management system designed to protect email, ensure access and simplify the tasks of managing email.
Avanan
Avanan's AI protects cloud email and collaboration suites from cyber attacks that evade default and advanced security tools. Its invisible, multi-layer security enables full-suite protection for cloud collaboration solutions such as Office 365, G-Suite, Teams, and Slack.
Java
Java is a widely-used programming language for coding web applications.Java is a multi-platform, object-oriented, and network-centric language that can be used as a platform in itself. It is a fast, secure, reliable programming language for coding everything from mobile apps and enterprise software to big data applications and server-side technologies.
AWS
AWS (Amazon Web Services) is a comprehensive, evolving cloud computing platform provided by Amazon that includes a mixture of infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) and packaged-software-as-a-service (SaaS) offerings.
MYSQL
MySQL, the most popular Open Source SQL database management system, is developed, distributed, and supported by Oracle Corporation.