Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Hari CP

Summary

Cyber Security Specialist around 4 years of experience. Subject Matter Expertise (SME) in Defensive Cyber Operations (DCO) and security measures, Cyber Threat Intelligence (CTI), Digital Forensics and Incident Response (DFIR).Used Defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. Experienced in monitoring and escalating potential threats in on prime and cloud environment using Splunk and Azure Sentinel. To seek & maintain a position that offers professional challenges utilizing interpersonal skills, excellent time management and problem solving skills. Proficient in conducting comprehensive vulnerability assessments, resulting in a 20% reduction in high-risk vulnerabilities through the utilization of industry-standard frameworks like PTES, NIST, OWASP, ISO 27001 and MITRE ATT&CK for mixed-box vulnerability assessments. Mastery in incident response strategies, with a track record of reducing incident resolution time by 30% during critical security incidents. Adept at managing Security Operations Centers (SOC), achieving a 15% increase in early threat detection and mitigation through proactive Threat Hunting, thereby averting potential security breaches.

Overview

4
4
years of professional experience
1
1
Certification

Work History

Cyber Security Engineer (Threat Analyst)

Ontinue
06.2023 - Current
  • Conducted comprehensive penetration testing for web applications, diligently following OWASP framework, identifying vulnerabilities, and delivering effective remediation recommendations
  • Demonstrated proficiency by creating various templates for different tools and managing vulnerabilities using platforms like Tenable.io and Rapid7 InsightVM
  • Actively contributed to development of technical and procedural documentation within Security Operations Center (SOC), promoting knowledge exchange and establishment of standardized procedures
  • Effectively integrated IDS/IPS with Snort tool, meticulously analyzing logs to filter out false positives and proactively adding false negatives into IDS/IPS rule sets, enhancing accuracy and efficiency of intrusion detection and prevention system
  • Dealt with advisory reports on active Zero-day exploits, stayed updated on emerging threats, and provided guidance on effective mitigation strategies
  • Identifying, analyzing, and resolving vulnerabilities using Threat Hunting and MITRE ATT&CK framework
  • Conducted thorough analysis of phishing emails to uncover indicators of compromise (IOCs) and indicators of attack (IOAs)
  • Implemented effective countermeasures and conduct user education campaigns to foster awareness and prompt reporting of phishing attempts
  • Managed various aspects of security, encompassing threat intelligence, threat hunting, EDR, email security, cloud security, malware analysis, and reverse engineering.

Triage and SOC Engineer

SOFTECH INFINIUM SOLUTIONS LIMITED
04.2021 - 06.2023
  • Played pivotal role in implementing two different security projects that significantly enhanced city's overall security posture, addressing specific and recent threat issues
  • Monitored system logs, SIEM tool (QRadar), and network traffic in real-time, actively investigating and interpreting any unusual or suspicious activity
  • Offered timely recommendations for resolution
  • Developed and enforced organization-wide Policies, Procedures, and Metrics, providing network and host-based security measures for each host within organization
  • Investigated security incidents and breaches, leveraging frameworks like MITRE ATT&CK and Cyber Kill Chain to understand attacker tactics, techniques, and procedures (TTPs)
  • Conducted thorough testing on systems and applications to identify potential security weaknesses and vulnerabilities, taking proactive steps to address and mitigate these risks.

Security Operation Center Engineer

DSIG IT SOLUTIONS
04.2020 - 04.2021
  • Installed, configured, and maintained a wide range of security software and firewalls, including IDS (Intrusion Detection System), IPS (Intrusion Prevention System), and leveraging the TCP/IP model to enhance the organization's security posture
  • Regularly reviewed and assessed the effectiveness of malware analysis techniques, intrusion detection/prevention systems, SIEM, application access control, Antivirus, and other network component policies
  • Monitored computer networks and systems proactively to detect and respond to potential security threats and breaches, ensuring overall security of organization's IT infrastructure
  • Deployed and fine-tuned Snort, with industry-leading open-source intrusion detection systems, to actively monitor and analyze network traffic for potential security threats and attacks.

Education

Bachelor of Technology - Computer Science and Engineering

Christu Jyoti Institute of Technology And Science
2020

Skills

  • Incident Response, SOC Monitoring, Threat Detection, Malware Analysis, Endpoint Protection, Data Encryption, Cloud Security, SIEM, Risk Analysis, Vulnerability Management, Penetration testing, Vulnerability Assessment, Risk Management, Developing Security Plans Continuity, Identifying Risks, Information Security Management, Critical Thinking Skills, Security Awareness, NIST Security Standards, Sans top 25, OWASP top 10, MITRE ATT&CK
  • SIEM Tools:
  • Splunk, Qradar, Azure sentinel
  • Intrusion Detection & Prevention System (IDS/IPS): Suricata, Snort
  • Vulnerability Scanning: Qualys Guard, Nessus
  • Digital Forensics: Autopsy, Volatility
  • Malware Analysis Tools: PE studio, Any-runio
  • Pen Testing Tools: Burp Suite, OWASP ZAP, Nmap, Wireshark
  • Policy Development: IT Security Policies, SOPs
  • Project Management: Agile, JIRA, S-SDLC
  • Cybersecurity Standards: ISO, NIST, CSA (Cloud Security Alliance)
  • Privacy Regulations: HIPAA, PCIDSS, GDPR, CLOUD Act
  • Operating System: Kali Linux, Windows, IOS, Linux
  • Post Exploitation Framework: Metasploit
  • Languages: Python, Bash Scripting

Certification

Certified Ethical Hacker(CEH)

Timeline

Cyber Security Engineer (Threat Analyst)

Ontinue
06.2023 - Current

Triage and SOC Engineer

SOFTECH INFINIUM SOLUTIONS LIMITED
04.2021 - 06.2023

Security Operation Center Engineer

DSIG IT SOLUTIONS
04.2020 - 04.2021

Bachelor of Technology - Computer Science and Engineering

Christu Jyoti Institute of Technology And Science
Hari CP