Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Hari Chandana

New Westminster,BC

Summary

Experienced Security Analyst with extensive experience in SOC operations, specializing in Endpoint Security Detection, Incident Response, Incident Management, Security Operations, and Log Analysis. Proven ability to effectively monitor, detect, analyze, and respond to security incidents to protect organizational assets. Skilled in utilizing industry-leading tools and methodologies to maintain a robust security posture across both on-premise and cloud environments. Strong analytical mindset, attention to detail, and commitment to continuous improvement in cybersecurity practices.

Overview

4
4
years of professional experience
1
1
Certification

Work History

Security Analyst

ESentire
10.2023 - Current
  • Performed event detection, investigations, and root cause analysis within the agreed Service Level Agreement timeline and followed the Kill chain process.
  • Monitored the internal network, systems, databases and applications using Splunk SIEM platform and performed initial alert triaging for all security alerts
  • Assisted in the SOC and IR team in developing IR playbooks for all common cyber security incidents.
  • Assisted the SOC team in developing SOC processes and procedures.
  • Experience in developing use cases in Splunk SIEM platform. Developed correlation and cross correlation use cases.
  • Developed weekly status reports on the status of security events that also includes KPIs (Log sources, performance of log sources, number of devices logging).
  • Boosted efficiency by automating repetitive tasks using scripting languages, such as Python or PowerShell.
  • Collaborated with external vendors to perform penetration tests on network devices, operating systems, and databases.
  • Experienced in AWS services such as EC2, S3 for secure storage, and IAM for identity management.
  • Contributed to digital forensic process to support incident response efforts and uncover the root causes of security incidents.

Security Analyst

Infosys Technologies
06.2020 - 07.2023
  • Monitored events from Firewall (Palo Alto), Antivirus (McAfee), Windows, Unix, Routers, Switches, IDS, Nessus, Qualys, and flow data using Splunk.
  • Analyzed, triaged, and remediated security incidents internally and performed analysis from different network devices
  • Developed rules, alerts, dashboards, and reports to educate corporate clients on their network security risks and suggest ways to remedy/mitigate any existing threats.
  • Trained on Arcsight and Splunk.
  • Knowledge of Amazon Web Services and related technologies including EC2, S3, KMS. Using the Prisma cloud, finding and resolving the AWS configuration issues.
  • Set up weekly, monthly and quarterly auditing tasks using Zapier.
  • Worked on Proofpoint Email protection and archiving tools.
  • . Inside the organization, Created and reviewed IT security policies as per GDPR, GMP, SOC2
  • Developed vulnerability management and emergency patch management processes to streamline the VM and patch management process within the security team
  • Assisted the risk & governance team during ISO 27001 control gap assessment to identify the control gaps and developed a roadmap on initiatives to be taken to align with ISO 27001 controls
  • Performed phishing simulations to identify the number of users prone to phishing attacks and conducted security awareness training to train employees on how to identify and report suspicious emails.
  • Experience in analyzing the severity of the vulnerabilities found as per the vulnerability scan report and prioritizing the vulnerabilities based on the risk and potential impact.

Education

Bachelor of Science -

Christu Jyoti Institute of Technology And Science
India
07.2020

Skills

  • Intrusion Detection, Endpoint Security, Identity and Access Management, Risk Mitigation
  • Amazon Web Services, Microsoft Azure, Windows, Kali Linux, Ubuntu, Google cloud Platform
  • Azure Sentinel, Elastic SIEM, Splunk, ArcSight ESM, logger, O365 security, Nessus, Certificate Authority, SIEM, AWS Key Management, Splunk, Cloud app security, Proofpoint
  • PowerShell, Python, and Go
  • Nmap, S3, EC2, S3 Glacier, Wireshark, Zendesk, Service Now, BMC remedy, Office 365, CloudWatch, Exchange, SharePoint, Burp Suite, Metasploit Framework

Certification

  • CEH - Certified Ethical Hacker
  • GCIH (pursuing)

Timeline

Security Analyst

ESentire
10.2023 - Current

Security Analyst

Infosys Technologies
06.2020 - 07.2023

Bachelor of Science -

Christu Jyoti Institute of Technology And Science
Hari Chandana