Highly motivated data security professional with experience as Software Tester and Security Analyst. Known to build strong customer relationships to understand requirements and deliver value-added solutions. Certified in COMPTIA Security+ and Splunk Core Certified Power User. Excels at learning new technology and best practices in establishing ethical Security Standards.
• Analyze and identify cyber threat activity based on their known techniques, tactics,
procedures (MITRE ATT&CK Framework)
• Analysis of host-based and network-based security alerts, responding to potential threats
and vulnerabilities
• Monitor, correlate, identify, analyze, mitigate, manage, track and support processes for all
security incidents
• Perform investigation of intrusion attempts and in-depth analysis of indicators of
compromise (IoC) from several log sources
• Perform initial triage on security events populated in the ticketing system, and
investigation and escalation of these events where applicable.
• Manage security events throughout the incident response life cycle
• Support the development of advanced Security Information and Event Management
(SIEM) rules and alerts to detect adversary techniques, tactics, and procedures by providing
tuning recommendations based on day-to-day monitoring and customer feedback
experiences
• Analyze a variety of security logs (Firewall, EDR, Syslog, Email, CASB, etc.) to determine
the impact of a security event and appropriate escalation procedures
• Coach and support other Threat Hunters to improve Difenda’s identification, analysis,
breach detection, and response
• Independently follow procedures to contain, analyze, and eradicate malicious activity
• Document all activities during an incident and provide leadership team with status updates
during the life cycle of the incident
• Create final incident reports detailing the events of an incident
• Support the development of processes and procedures to improve monitoring, analysis,
detection, incident response times, and overall C3 operations
• Promote a consistent delivery of Security Operations Center services through the habitual
capture and reuse of the documentation within the SOC knowledgebase
• Foster trust and positively contribute to the Difenda culture by exhibiting open, honest and
collaborative qualities in all interactions
• Implement, maintain, and operate information security controls and countermeasures,
maintaining strict change and configuration management, including all documentation.
• Monitor information systems for security incidents and vulnerabilities, develop monitoring
and visibility capabilities, and report on incidents, vulnerabilities, and trends.
• Respond to security incidents, including investigation of countermeasures to, and recovery
from, computer-based attacks, unauthorized access, and data breaches. Determine and
direct remediation and recovery efforts.
• Oversee and ensure regular and effective communications with internal and external
customers relating to security incidents.
• Review asset discovery and vulnerability assessment data to identify vulnerability
remediation measures.
• Develop monitoring and visibility capabilities, configure, and manage security monitoring
tools.
• Participate in and support the development of information security training and awareness
programs.
• Analyse trends, news, and changes in environment with respect to organizational risk,
develop and execute plans for compliance and mitigation of risk, perform risk assessments.
• Work with the Operations and Compliance teams to conduct regular security audits and
assessments and oversee any remediation activities.
• Explore ways to identify threats using the latest threat intelligence.
• Conduct penetration tests and breach and attack simulations to validate resiliency and
identify areas of weakness to fix.
• Continuously review and optimize security monitoring tools based on threat-hunting
discoveries.
• Perform any other duties as required
• Conducted vulnerability assessment for company applications and office architecture.
• Helped Team in mitigating Ransomware attack on company.
• Collude with Clients in application, network and information security and deliver directions.
• Perform Penetration Testing on Client applications for SQL injections and XSS vulnerabilities.
• Conduct Port scanning using Nmap/Zenmap enumerating open ports on target hosts.
Programming- Java
undefinedComptia Security+