Summary
Overview
Work History
Education
Skills
Projects
Timeline
Generic

ASHISH HEDAU

Brampton,ON

Summary

Resourceful Information Security Analyst known for high productivity and efficient task completion. Possess specialized skills in threat analysis, incident response, and security policy development. Excel in critical thinking, problem-solving, and communication, ensuring robust security measures are implemented effectively.

Overview

3
3
years of professional experience

Work History

Information Security Analyst (Co-Op)

First National Financial LP
Toronto
05.2023 - 08.2023

Managed Engine

  • Security Incident Monitoring: Utilized Managed Engine to continuously monitor the network for security incidents, ensuring timely detection and resolution of potential threats.

Microsoft Defender 365

  • Threat Detection and Response: Implemented and configured Microsoft Defender 365 to detect and respond to advanced threats across email, data, and endpoints.

Qualys

  • Vulnerability Management: Conducted regular vulnerability scans using Qualys to identify, assess, and remediate vulnerabilities across the IT infrastructure.

eSentire

  • 24/7 Threat Monitoring: Collaborated with eSentire to maintain 24/7 threat monitoring and incident response services, analyzing alerts and coordinating with internal teams for remediation.

Trend Micro

  • Advanced Threat Protection: Deployed Trend Micro solutions to provide advanced threat protection across the organization’s network and endpoints, monitoring threat intelligence feeds to enhance detection capabilities

Information Security Analyst

MD India Healthcare Pvt. Ltd.
Nagpur, MH
08.2020 - 08.2022

Qualys Guard

  • Vulnerability Assessment: Leveraged Qualys Guard for comprehensive vulnerability assessments across the network, identifying and categorizing vulnerabilities to prioritize remediation efforts, ensuring a secure IT environment and compliance with industry standards.

Wireshark

  • Network Traffic Analysis: Utilized Wireshark to capture and analyze network traffic, identifying suspicious activities and potential security breaches, providing detailed packet-level insights to support forensic investigations and incident response.

Autopsy

  • Digital Forensics: Conducted in-depth forensic analysis using Autopsy to examine digital evidence, recovering deleted files, analyzing file systems, and uncovering artifacts to support investigations into security incidents and data breaches.

Nessus

  • Risk Management: Employed Nessus for regular network scans to detect vulnerabilities, misconfigurations, and policy violations, generating detailed reports to inform risk management strategies and improve the organization’s security posture.

Splunk

  • Security Information and Event Management (SIEM): Integrated Splunk for real-time monitoring and analysis of security events, correlating data from various sources to detect anomalies, generate alerts, and support effective incident response and threat hunting activities.

Education

Post Graduation in Cybersecurity Operations And Offensive Cybersecurity - Information Technology - Cybersecurity

York University
Toronto, ON
12-2023

Bachelors in Computer Applications - Computer Applications Development

J.R.N. Rajasthan University
Udaipur
01.2019

Skills

  • Intrusion detection and response
  • Log analysis
  • Managing user access
  • SIEM tool knowledge
  • Kali Linux
  • Penetration Testing
  • Active Directory
  • Burp Suite, Metasploit, Hashcat, Nmap, BloodHound

Projects

Knowquest (Academic Feedback Platform)

  • Cybersecurity Policy Development: Developed a comprehensive cybersecurity policy for the client, aligning with the latest industry standards and regulations. The policy encompassed critical aspects such as access controls, incident management, data protection, and disaster recovery, ensuring robust security measures to protect sensitive information and enhance overall cybersecurity posture.

Penetration Testing Capstone

  • Penetration Testing Collaboration: Partnered with the fictional entity 'relia.com' to conduct penetration testing on their Active Directory (AD) infrastructure. Developed a detailed penetration testing report that identified vulnerabilities and proposed strategies for enhancing security. Utilized tools such as Burp Suite, Metasploit, Hashcat, Nmap, and BloodHound to identify and exploit weaknesses, providing actionable recommendations to improve the infrastructure's security posture.

Timeline

Information Security Analyst (Co-Op)

First National Financial LP
05.2023 - 08.2023

Information Security Analyst

MD India Healthcare Pvt. Ltd.
08.2020 - 08.2022

Post Graduation in Cybersecurity Operations And Offensive Cybersecurity - Information Technology - Cybersecurity

York University

Bachelors in Computer Applications - Computer Applications Development

J.R.N. Rajasthan University
ASHISH HEDAU