Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Mohitha Gadde

Toronto,Ontario

Summary

Computer security professional with 4 years of progressive experience in the security industry. Demonstrated expertise in implementing various security frameworks, including NIST, PCI-DSS, MITRE ATT&CK, and ISO, to enhance the security posture of enterprise organizations. Skilled SOC Analyst with a background in cyber threat detection, vulnerability assessment, and risk mitigation. Experienced in implementing security measures for networks and systems, ensuring data integrity and confidentiality. Strengths include deep understanding of cybersecurity frameworks, incident response protocols, and forensic investigation techniques. Previous roles have realized improved system resilience against cyber threats.

Overview

7
7
years of professional experience
1
1
Certification

Work History

SOC Analyst

PwC
Toronto, Ontario
02.2023 - Current
  • Monitored security alerts and incidents using Splunk as the primary SIEM system to identify real-time potential threats and anomalies
  • The SIEM tool Azure Sentinel was used to monitor system logs and analyze real-time network traffic actively
  • Identified, investigated, and reported suspicious or anomalous activities, providing timely solutions and developed custom dashboards and reports by integrating data from various devices into the Azure Sentinel environment, enhancing the visualization and understanding of security events
  • Operated in a 24/7 security operations center, proactively monitoring, investigating, and mitigating security events
  • Leveraged advanced security tools, including Endpoint Detection and Response (EDR) and threat-hunting platforms, to thoroughly analyze and investigate complex security incidents and breaches
  • Collaborated with SOC L2 and L3 analysts to investigate security incidents, providing essential context and gathering relevant data for the incident response process
  • Utilized Vulnerability Assessment tools like Nessus and NMAP to conduct security testing and identify system weaknesses
  • Investigated malicious phishing emails, domains, and IPs using open-source tools and recommended blocking strategies based on analysis
  • Experience in MSSP cybersecurity posture by providing access to specialized expertise, proactive monitoring, and responsive support tailored to the organization's needs

Security Analyst Intern

Kyndryl
Toronto, Canada
04.2022 - 01.2023
  • Conducting Exploratory Data Analysis (EDA), including acquiring, engineering, and exploring various data types and log sources for detection opportunities
  • Working with the detections engineering team to transform attacker TTPs into viable, low false positive behavioral and signature detections using a variety of techniques, including supervised, semi-supervised, and unsupervised ML, with an emphasis on sequential classification and pattern matching
  • Participating in 'hunt missions' using threat intelligence, analysis of anomalous log data, and results of brainstorming sessions to detect and eradicate threat actors on corporate networks
  • Communicating potential threats, suspicious/anomalous activity, malware, etc., to the IR team and being a point of contact to other teams
  • Conducting forensic analysis of network packet captures, DNS, proxy, Netflow, malware, host-based security, application logs, and logs from various types of security sensors
  • Performing analysis of security incidents & threat actors for further enhancement of Detection Catalog and Hunt missions by leveraging the MITRE ATT&CK framework

SOC Analyst

Callhealth
Hyderabad, India
06.2018 - 11.2019
  • Conducted in-depth malware analysis using sandboxing and specialized tools to understand the behavior of malicious software
  • Collaborated with developers, engineers, and organizational leaders to identify opportunities for process improvements, recommending system modifications to enhance data security and operational efficiency
  • Employed open-source tools to investigate suspicious phishing emails, domains, and IPs, and recommended appropriate blocking techniques based on the analysis
  • Conducted follow-up scans to check for additional infections post-remediation
  • Once cleared, re-enrolled the systems into the network
  • Collaborated with programmers, engineers, and organizational leaders to identify process improvement opportunities, recommending system modifications for enhanced data security and efficiency
  • Assisted in the implementation and maintenance of security technologies and tools, including IDS/IPS, firewalls, SIEM, and encryption mechanisms, to safeguard critical data and systems
  • Collaborated with cross-functional teams to perform security testing, including penetration testing and vulnerability assessments, identifying weaknesses in the organization's security posture

Education

Master of Science - Cyber Security

NYIT
Vancouver, BC
12.2021

Bachelor of Science - Computer Science

MLWEC
Guntur, India
05.2018

Skills

  • Vulnerability Management: Nessus, Nmap, and Qualys
  • SIEM: QRadar,Splunk,Azure Sentinel, and NIST
  • XDR: Cortex XDR, CrowdStrike Falcon, and Trend Micro
  • Platforms: Azure, Amazon Web Services (AWS), QualysGuard, Burp Suite, Windows Server
  • Languages: Bash, Python

Certification

  • CompTIA Security+
  • Google cybersecurity certifications: Connect and Protect: Networks and Network Security
  • Google cybersecurity certifications: Foundations of Cybersecurity
  • Google cybersecurity certifications: Play It Safe: Manage Security Risks

Timeline

SOC Analyst

PwC
02.2023 - Current

Security Analyst Intern

Kyndryl
04.2022 - 01.2023

SOC Analyst

Callhealth
06.2018 - 11.2019

Master of Science - Cyber Security

NYIT

Bachelor of Science - Computer Science

MLWEC
Mohitha Gadde