Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Madhuri Divya

Burnaby,BC

Summary

Results-driven Information Security Professional specializing in threat detection, incident response, and vulnerability management. Proven track record in safeguarding IT systems through advanced security monitoring techniques using SIEM and EDR tools. Expertise encompasses cloud security solutions, effectively managing security risks to protect organizational assets.

Overview

7
7
years of professional experience
1
1
Certification

Work History

Security Administrator

Pacific Blue Cross
Burnaby, Canada
06.2024 - Current
  • Performed detailed investigations and root-cause analysis for threat events triggered in Splunk & Sentinel and provided subject-matter expertise to reduce false positives.
  • Customized SIEM queries to enhance the detection capabilities.
  • Triaged alerts from the Crowdstrike EDR and Microsoft Defender. Acted swiftly to block malicious URLs, senders, and domains based on suspicious email activities.
  • Conducted vulnerability assessments using Rapid 7 Nexpose and prioritized vulnerabilities based on the impact and risk.
  • Collaborated with IT and firewall teams to apply necessary blocks and secure the network following detected intrusions.
  • Conducted threat hunting operations using Carbon black, Microsoft Sentinel and custom scripts to proactively identify and neutralize potential threats.
  • Utilized IOCs extracted from investigations to optimize threat hunting queries and fine-tune detection logic.
  • Performed phishing simulations and conducted annual security awareness training and rolled out quarterly phishing campaigns by leveraging Knowbe4 platform.
  • Managed Proofpoint and configured Microsoft 365 threat protection policies (anti-spam, anti-malware, anti-phishing).
  • Developed Data Loss Prevention (DLP) policies and sensitivity labels in Microsoft Purview.
  • Developed playbooks for common security incidents such as DOS attacks, Phishing, unauthorized access, Brute force, malware infections, supply chain attacks.
  • Reviewed operational effectiveness of security controls, processes, and procedures against the NIST cybersecurity framework.

IT Security Analyst

Softchoice
Toronto, Canada
03.2022 - 05.2024
  • Conducted continuous monitoring and analysis of security incidents using Splunk and Microsoft Sentinel, ensuring quick identification and response.
  • Managed daily SIEM(Splunk, Sentinel) alerts, investigated potential threats, and escalated incidents as required to higher-tier analysts.
  • Assisted in developing and refining SIEM use cases to improve detection capabilities across the organization.
  • Created Logic Apps, Playbooks and automated threat response in Microsoft Sentinel.
  • Investigated endpoint incidents using CrowdStrike Falcon, Defender for End point, containing malware infections and analyzing root causes.
  • Leveraged threat intelligence platforms (Recorded Future, ThreatConnect) to correlate threat data and enhance incident response efforts.
  • Created detailed reports on security incidents, including steps taken for investigation, mitigation, and lessons learned.
  • Performed root cause analysis of security incidents and provided recommendations to prevent recurrence.
  • Conducted third party security assessments and oversaw third party vendor risk management by assessing security controls and compliance measures of external partners.
  • Conducted gap analysis against ISO 27001, GDPR and SOC 2 requirements, identified deficiencies, and developed remediation plans to address gaps and improve control effectiveness.
  • Monitored compliance programs in alignment with GDPR, SOC2 and other regulatory requirements.
  • Prioritized vulnerabilities based on risk and potential impact by analyzing findings from vulnerability scan reports. Developed vulnerability management workflows and operational metrics for prioritizing remediation efforts.

Security Analyst

BluSapphire
Hyderabad, India
08.2018 - 02.2022
  • Gained in-depth training on ArcSight and Splunk SIEM platforms, analyzing logs from diverse sources and creating advanced correlation rules to improve event detection and response capabilities.
  • Implemented 802.1X authentication and MAC-based authentication on network switches.
  • Configured and managed device compliance policies for windows, Linux, and Mac OS machines using Microsoft Intune.
  • Handled password rotation for users and communicating with them for the same.
  • Supported audit readiness by assisting in external and internal audit activities, ensuring adherence to compliance requirements.
  • Researched emerging threats and vulnerabilities, deriving indicators of compromise (IOCs) for analysis tools.
  • Conducted research on emerging security products and services to recommend tools and solutions that align with industry best practices.

Education

Bachelor of Technology - Computer Science

Jawaharlal Nehru Technological University
Andhra Pradesh

Skills

  • Technologies & Tools: Splunk, Microsoft Sentinel, Nessus, Microsoft Entra ID (Azure Active Directory), Defender for cloud, Virus Total, Nmap, CrowdStrike, SCCM, Intune, Knowbe4, OSINT tools
  • Standards & Frameworks: NIST CSF, PCI DSS, ISO 27001, GDPR, SOC2 Type 2, HIPAA
  • Network and security protocols, such as TCP/IP, UDP, HTTP, HTTPS, DHCP, and LDAP
  • Programming Languages and scripting: PowerShell, Python
  • Operating systems: Windows, Linux, Mac
  • Cloud: Microsoft Azure, Office 365 SaaS, AWS

Certification

  • AZ-900 Microsoft Azure Fundamentals
  • SC-200 Microsoft Certified: Security Operations Analyst Associate
  • CompTIA Security +

Timeline

Security Administrator

Pacific Blue Cross
06.2024 - Current

IT Security Analyst

Softchoice
03.2022 - 05.2024

Security Analyst

BluSapphire
08.2018 - 02.2022

Bachelor of Technology - Computer Science

Jawaharlal Nehru Technological University
Madhuri Divya