Resourceful Information Security Analyst known for high productivity and efficient task completion. Possess specialized skills in threat analysis, incident response, and security policy development. Excel in critical thinking, problem-solving, and communication, ensuring robust security measures are implemented effectively.
Overview
3
3
years of professional experience
Work History
Information Security Analyst (Co-Op)
First National Financial LP
Toronto
05.2023 - 08.2023
Managed Engine
Security Incident Monitoring: Utilized Managed Engine to continuously monitor the network for security incidents, ensuring timely detection and resolution of potential threats.
Microsoft Defender 365
Threat Detection and Response: Implemented and configured Microsoft Defender 365 to detect and respond to advanced threats across email, data, and endpoints.
Qualys
Vulnerability Management: Conducted regular vulnerability scans using Qualys to identify, assess, and remediate vulnerabilities across the IT infrastructure.
eSentire
24/7 Threat Monitoring: Collaborated with eSentire to maintain 24/7 threat monitoring and incident response services, analyzing alerts and coordinating with internal teams for remediation.
Trend Micro
Advanced Threat Protection: Deployed Trend Micro solutions to provide advanced threat protection across the organization’s network and endpoints, monitoring threat intelligence feeds to enhance detection capabilities
Information Security Analyst
MD India Healthcare Pvt. Ltd.
Nagpur, MH
08.2020 - 08.2022
Qualys Guard
Vulnerability Assessment: Leveraged Qualys Guard for comprehensive vulnerability assessments across the network, identifying and categorizing vulnerabilities to prioritize remediation efforts, ensuring a secure IT environment and compliance with industry standards.
Wireshark
Network Traffic Analysis: Utilized Wireshark to capture and analyze network traffic, identifying suspicious activities and potential security breaches, providing detailed packet-level insights to support forensic investigations and incident response.
Autopsy
Digital Forensics: Conducted in-depth forensic analysis using Autopsy to examine digital evidence, recovering deleted files, analyzing file systems, and uncovering artifacts to support investigations into security incidents and data breaches.
Nessus
Risk Management: Employed Nessus for regular network scans to detect vulnerabilities, misconfigurations, and policy violations, generating detailed reports to inform risk management strategies and improve the organization’s security posture.
Splunk
Security Information and Event Management (SIEM): Integrated Splunk for real-time monitoring and analysis of security events, correlating data from various sources to detect anomalies, generate alerts, and support effective incident response and threat hunting activities.
Education
Post Graduation in Cybersecurity Operations And Offensive Cybersecurity - Information Technology - Cybersecurity
York University
Toronto, ON
12-2023
Bachelors in Computer Applications - Computer Applications Development
J.R.N. Rajasthan University
Udaipur
01.2019
Skills
Intrusion detection and response
Log analysis
Managing user access
SIEM tool knowledge
Kali Linux
Penetration Testing
Active Directory
Burp Suite, Metasploit, Hashcat, Nmap, BloodHound
Projects
Knowquest (Academic Feedback Platform)
Cybersecurity Policy Development: Developed a comprehensive cybersecurity policy for the client, aligning with the latest industry standards and regulations. The policy encompassed critical aspects such as access controls, incident management, data protection, and disaster recovery, ensuring robust security measures to protect sensitive information and enhance overall cybersecurity posture.
Penetration Testing Capstone
Penetration Testing Collaboration: Partnered with the fictional entity 'relia.com' to conduct penetration testing on their Active Directory (AD) infrastructure. Developed a detailed penetration testing report that identified vulnerabilities and proposed strategies for enhancing security. Utilized tools such as Burp Suite, Metasploit, Hashcat, Nmap, and BloodHound to identify and exploit weaknesses, providing actionable recommendations to improve the infrastructure's security posture.
Timeline
Information Security Analyst (Co-Op)
First National Financial LP
05.2023 - 08.2023
Information Security Analyst
MD India Healthcare Pvt. Ltd.
08.2020 - 08.2022
Post Graduation in Cybersecurity Operations And Offensive Cybersecurity - Information Technology - Cybersecurity
York University
Bachelors in Computer Applications - Computer Applications Development