As a seasoned Cybersecurity Analyst with over eight years of professional experience, I specialize in information security, disaster recovery, incident response, and vulnerability assessment. My career is dedicated to enhancing security protocols and mitigating the risk of cyber threats for large organizations, ensuring the confidentiality, integrity, and availability of critical systems and data.
I manage Azure cloud security, implementing robust measures and collaborating with the Global Security Operations Center (SOC) to address incidents. I conduct threat intelligence analysis, monitor network security, and ensure best practices. My work with tools like Splunk, Qualys, and Microsoft Defender strengthens our threat detection and response.
Experience
abb
Nov 2021 – Present
Bengaluru
Cloud Security Operations Engineer
As a Digital Cybersecurity Analyst at ABB GISPL, I manage security and compliance on the Azure platform, ensuring robust protection against cyber threats and alignment with industry standards. I conduct continuous security monitoring using App Insights, Log Analytics, Azure Monitor, and Network Performance Monitor, and enforce security permissions and restrictions through Role-Based Access Control (RBAC).
Collaborating with the Global Security Operations Center (SOC), I resolve security incidents and enhance the Security Information and Event Management (SIEM) model. I monitor Microsoft Defender for cloud security alerts, conducting investigations and remediating threats.
Additionally, I enhance system security for Windows and Linux virtual machines by performing end-to-end installation of Qualys agents and addressing vulnerabilities identified in Qualys agent reports. I review and update security policies to ensure compliance with current best practices and standards, and proactively monitor network security group (NSG) rules, identifying and mitigating open ports and undefined rules.
I develop Windows VM hardened images in line with CIS Benchmarks to ensure secure system configurations. My work also involves creating threat intelligence documents from security blogs and websites to identify Indicators of Compromise (IOCs) and protect the environment from attacks
Tata Consultancy Services
Nov 2018 – Oct 2021
Bengaluru
IT Analyst
As an IT Analyst at Tata Consultancy Services, I utilized SourceFire and SNORT NIDS for signature-based detection of security-related events and alerts. I analyzed and troubleshot IDS captures of suspected traffic to ensure security threats were mitigated.
I monitored, troubleshot, and triaged incidents related to attacks such as DDoS, ransomware, and credential validation, using Splunk and Vault to validate alerts and confirm mitigation according to current security controls.
Conducting dynamic analysis of malicious binaries and URLs using FireEye Malware Analysis System (MAS) and Cisco Threat Grid, I investigated phishing emails that bypassed Proofpoint security by examining mail headers, URLs, IP reputations, and attachments to assess and mitigate threats.
I monitored brand and dark web activities to identify publicly available sensitive information and escalated findings for appropriate action. I created threat intelligence reports using open-source tools such as Google Suite Toolbox, Cisco Talos, Virus Total, MXToolBox, and Bluecoat Site Review.
My role also involved analyzing suspect traffic logs, including those from Firewalls, Akamai WAF, Proofpoint, Bluecoat, and Zscaler, to detect anomalies and potential security threats. Additionally, I scanned suspicious files and applications on client PCs using Symantec antivirus and SONAR alerts to identify true positives and quarantine or delete malicious applications.
Wipro Limited.
Sep 2014 – Nov 2018
Bengaluru
Information Security Practitioner
As a Cyber Security Analyst at Wipro Technologies, I managed the enterprise threat intelligence platform, collecting indicators of compromise and vulnerability details for proactive threat identification. I monitored Security Information and Event Management (SIEM) use cases to ensure controls were in place to mitigate threats and reduce the attack count.
I investigated alerts generated from Intrusion Prevention Systems (IPS), McAfee NSM, Splunk, and firewalls, including Palo Alto and Check Point, to provide accurate remediation. I monitored host, network, and firewall alerts based on severity, focusing on preventing data loss and ensuring system protection.
Working within the Cloud-Ops team, I scanned client AWS and Azure servers using Qualys, addressing the latest security vulnerabilities and assessing their impact on servers and network devices. I provided appropriate remediation to concerned teams to fix application vulnerabilities in AWS and Azure environments.
Additionally, I tracked ongoing, upcoming, and historic threats to ensure timely remediation of affected systems, maintaining a secure environment for enterprise operations.