Summary
Overview
Work History
Education
Skills
Accomplishments
Timeline
Generic

Nancy Mehta

Summary

Persistent, detail-oriented cyber security consultant with government security clearance. Well-versed in network security, troubleshooting and cybersecurity skills. Able to thrive in fast-paced and challenging environments where accuracy and efficiency matter.

Overview

6
6
years of professional experience

Work History

TELUS

Cyber Threat Intelligence Consultant Level II
08.2021 - Current
  • Conducting in-depth analysis of cyber threats, emerging trends , and attack vectors to identify potential risk and vulnerabilities.
  • Monitoring open-source intelligence (OSINT) platforms, dark web forums, and other relevant sources to gather actionable intelligence for proactive defense measures.
  • Providing real-time analysis and threat intelligence updates during security incidents
  • Preparing and presenting threat intelligence reports and security advisories to clients and various stakeholders.
  • Proactively search for indicators of compromise (IOCs) and anomalous activity within the organization's network and systems.
  • Monitoring and tracking the threat actor groups, their tactics, techniques, and procedures (TTPs) using open source and commercial intelligence sources.
  • Working on XSOAR integration with CTI platforms..
  • Participating in threat intelligence sharing communities, forums, and working groups to stay updated with the latest landscape and collaborate with industry peers.

CGI

Cyber Threat Intelligence (CTI) Consultant
01.2021 - 06.2021
  • Informing and advising clients on incidents and incident prevention through weekly reports, flash reports, and briefings.
  • Tracking cyber threat actors/campaigns based on technical analysis and open-source intelligence.
  • Ingesting IOC in Threat intelligence platform.
  • Researching, analyzing, and providing reports on threat actor campaigns as required.
  • Developing, documenting, and presentations on security threats to clients including technical & non-technical audiences.
  • Analyzing threat actor tactics, techniques, and procedures to characterize adversary's technical methods for accomplishing their missions.

CGI

SOC Analyst
10.2020 - 01.2021
  • Monitoring security alerts of potentially malicious activity detected by security systems such as Intrusion Detection & Prevention Systems (NIDS/NIPS, HIDS/HIPS, WIDS), Log Monitoring, EDR, and SIEM.
  • Conducting triage and investigation on alerts from various security controls.
  • Worked with the security team to enhance processes & procedures for mitigating threats.
  • Provide cybersecurity subject matter expertise to clients through emails/phones in incident response, network security controls, implementations, upgrades, patching, and network solutions.

Nokia

Network TAC Engineer
10.2017 - 10.2020
  • Provide remote technical support for customers on deployment, maintain and upgrade hardware/software, security configurations on various Nokia Devices by applying both established procedures and creative alternatives.
  • Provide technical consulting, troubleshooting network outages, misconfigurations, and complex networking issues for the major telecommunication clients.
  • Worked with technologies such as 5G deployment, IPSEC Tunneling, Service Aware Manager account management tool.
  • Conducted risk assessment for customers on Method of procedure (MOP), configuration changes, and hardware/software upgrade over production network.
  • Perform detailed lab setups and problem replications to identify the configuration issues, impact, and bugs etcetera.
  • Packet capture analysis using Wireshark for debugging complex issues.
  • Created knowledgebase articles, summaries, metrics, and KPI(s) documentation to assist in future support.

Education

Rogers Cybersecure Catalyst Program -

Ryerson University
Brampton, ON, Canada
2020

M.Eng - Internetworking (GPA 3.9/4.3)

Dalhousie University
Halifax, NS
2017

Skills

  • Networking: OSI and TCP/IP , DNS, DHCP, Routing, Firewalls
  • IPS/IDS and Firewall log analysis, Phishing email analysis-DKIM & SPF
  • OSINT: VT, MISP, Recorded Future, Flashpoint, Netcraft, Domain Tools, Google dork searches,, Hybrid Analysis, urlscan, Alienvault otx, DNSdumpster, DomainBigData, Shodan, SecurityTrails, TweetDeck, Feedly, Cyberchef
  • Digital Forensics - System Log files analysis, Image and Memory Capture, Memory Analysis
  • Windows -Filesystems, Access Control, and Permissions, Registry analysis, Event log analysis, PowerShell scripting
  • Linux- Log analysis, Bash scripting, Access Control, and File Permissions
  • Cyber Kill Chain, PICERL approach, MITRE ATT&CK, Diamond Model
  • Cloud Platform- Microsoft Azure, AWS
  • Security tools - Splunk, Crowdstrike, FortiSOAR, ArcSight, Carbon Black, Zabbix, Fortinet FortiGuard, Nmap, Kibana, Rapid 7, EXIF tool, Volatility, Wireshark, Tcpdump, TCPview,
  • Vulnerability and Risk assessment
  • Networking protocols: MPLS, BGP, VPRN, VPLS, ISIS, and OSPF
  • Cryptography , Encryption, Hashing, Digital Certificates, PGP
  • Knowledge of C and Python programming language
  • Knowledge of different attack vectors: Distributed denial of attack, Exploit Kit, Malware types, Buffer overflow, Cross-Site Scripting, SQL injection, File inclusion, Directory Traversal

Accomplishments

  • GIAC GSEC and GCIH certified.
  • GIAC Advisory Board Member.
  • SANS SEC504 CTF Challenge Coin.
  • Completed CompTIA Security+ training on Linux Academy.
  • Nokia certifications: NRS1 & NRS 2, BGP-4A0-102, VPRN-4A0-106.

Timeline

TELUS

Cyber Threat Intelligence Consultant Level II
08.2021 - Current

CGI

Cyber Threat Intelligence (CTI) Consultant
01.2021 - 06.2021

CGI

SOC Analyst
10.2020 - 01.2021

Nokia

Network TAC Engineer
10.2017 - 10.2020

Rogers Cybersecure Catalyst Program -

Ryerson University

M.Eng - Internetworking (GPA 3.9/4.3)

Dalhousie University
Nancy Mehta