Summary
Overview
Work History
Education
Skills
Accomplishments
Certification
Timeline
Generic

Ramesh Vinay Thota

Toronto,ON

Summary

Cyber Security Analyst with proficient and through experience and good understanding of information technology. Specialized in proactive monitoring real-time security events on

Overview

1
1
Certification

Work History

SOC ANALYST

National Bank of Canada


  • Creating and fine-tuning the rules to eliminate the false positives
  • Implement security countermeasures to mitigate security related threats
  • Raising incident with concern teams, respond to the incidents and service requests and bring together additional information to either resolve or escalate the issue to the appropriate teams
  • Take follow-ups and closing of the tickets based on the client response
  • Provide communications relating to Security events
  • Monitor and respond to all required operational support Network events
  • Should be highly analytical and have the ability to quickly identify, replicate & resolve reported issues
  • Monitoring inbound and outbound traffic for the firewall and investigating events
  • Correlate data by researching logs, analyzing graphs and packet inspection to provide detailed customer reports
  • Detecting Suspicious Logs, creating reports and Charts for easy understandable by
  • Client, Communicating with clients regarding issues
  • Monitoring IOC (Indicators of Compromise)
  • Making reports as per client requirements
  • Generating and Making Daily, Weekly and Monthly reports and charts
  • Watch Active Channels/ Dashboards and create annotations
  • Investigate Incidents using Channels/Events/Graphs/Annotations and Reports
  • Hands on experience in monitor events and Investigate incident on a daily basis
  • Handling of Advisory Emails from CSIS and updating to concerned stakeholders
  • Hands on experience on the Incident Response activities like malware analysis, phishing analysis
  • Escalating issues to Higher Level and management when necessary
  • Investigate incidents using Active Channels/Dashboards/Events/Graphs/Annotations and reports
  • Monitoring real-time security events on SIEM (Microfocus ArcSight, RSA Netwitness,
  • DEVO, LogRhythm Siemplify, IBM Qradar, Azure Sentinel) consoles
  • Assist with designing and documenting work processes with in the SOC
  • Attending Bi-weekly and Monthly meetings to deliver presentations to clients.

SOC ANALYST

CI Financial


  • Creating and fine-tuning the rules to eliminate the false positives
  • Implement security countermeasures to mitigate security related threats
  • Raising incident with concern teams, respond to the incidents and service requests and bring together additional information to either resolve or escalate the issue to the appropriate teams
  • Take follow-ups and closing of the tickets based on the client response
  • Provide communications relating to Security events
  • Monitor and respond to all required operational support Network events
  • Should be highly analytical and have the ability to quickly identify, replicate & resolve reported issues
  • Monitoring inbound and outbound traffic for the firewall and investigating events
  • Correlate data by researching logs, analyzing graphs and packet inspection to provide detailed customer reports
  • Detecting Suspicious Logs, creating reports and Charts for easy understandable by
  • Client, Communicating with clients regarding issues
  • Monitoring IOC (Indicators of Compromise)
  • Making reports as per client requirements
  • Generating and Making Daily, Weekly and Monthly reports and charts
  • Watch Active Channels/ Dashboards and create annotations
  • Investigate Incidents using Channels/Events/Graphs/Annotations and Reports
  • Hands on experience in monitor events and Investigate incident on a daily basis
  • Handling of Advisory Emails from CSIS and updating to concerned stakeholders
  • Hands on experience on the Incident Response activities like malware analysis, phishing analysis
  • Escalating issues to Higher Level and management when necessary
  • Investigate incidents using Active Channels/Dashboards/Events/Graphs/Annotations and reports
  • Monitoring real-time security events on SIEM (Microfocus ArcSight, RSA Netwitness,
  • DEVO, LogRhythm Siemplify, IBM Qradar, Azure Sentinel) consoles
  • Assist with designing and documenting work processes with in the SOC
  • Attending Bi-weekly and Monthly meetings to deliver presentations to clients.

SOC ANALYST

Capgemini
  • Act as the point of Shift Lead Role
  • Creating and fine-tuning the rules to eliminate the false positives
  • Implement security countermeasures to mitigate security related threats
  • Raising incident with concern teams, respond to the incidents and service requests and bring together additional information to either resolve or escalate the issue to the appropriate teams
  • Take follow-ups and closing of the tickets based on the client response
  • Provide communications relating to Security events
  • Monitor and respond to all required operational support Network events
  • Should be highly analytical and have the ability to quickly identify, replicate & resolve reported issues
  • Monitoring inbound and outbound traffic for the firewall and investigating events
  • Correlate data by researching logs, analyzing graphs and packet inspection to provide detailed customer reports
  • Detecting Suspicious Logs, creating reports and Charts for easy understandable by
  • Client, Communicating with clients regarding issues
  • Monitoring IOC (Indicators of Compromise)
  • Making reports as per client requirements
  • Generating and Making Daily, Weekly and Monthly reports and charts
  • Watch Active Channels/ Dashboards and create annotations
  • Investigate Incidents using Channels/Events/Graphs/Annotations and Reports
  • Hands on experience in monitor events and Investigate incident on a daily basis
  • Handling of Advisory Emails from CSIS and updating to concerned stakeholders
  • Hands on experience on the Incident Response activities like malware analysis, phishing analysis
  • Escalating issues to Higher Level and management when necessary
  • Investigate incidents using Active Channels/Dashboards/Events/Graphs/Annotations and reports
  • Monitoring real-time security events on SIEM (Microfocus ArcSight, RSA Netwitness,
  • DEVO, LogRhythm Siemplify, IBM Qradar, Azure Sentinel) consoles
  • Assist with designing and documenting work processes with in the SOC
  • Attending Bi-weekly and Monthly meetings to deliver presentations to clients.

Education

Masters - Supply Chain Management & Project Management

Montreal College of IT & St. Lawrence
Montreal, Canada
2021

Bachelor of Engineering - B.com Computers

Siva Sivani Degree College (Osmania University)
Hyderabad, India
2018

Skills

  • SIEM management
  • Vulnerability Assessment
  • TCP and IP Protocols
  • Intrusion Detection
  • Data Loss Prevention
  • Incident Response
  • Data Security
  • Problem-solving aptitude
  • Team building
  • Adaptability
  • Risk Assessment

Accomplishments

  • SIEM (Microfocus ArcSight, RSA Netwitness, DEVO, LogRhythm, Siemplify, IBM Qradarconsoles
  • Have a deep knowledge in identifying and analyzing suspicious events
  • Versatile,bilingual professional and ability to manage sensitive materials
  • Able to use various securitytools to perform logs and packet analysis as well as performing Security SIEM Operationaltasks - Analysis, Filters, Active channels, Reports, Dashboards and Suggestion of fine-tuningon existing rules
  • Have good Knowledge on TCP/IP, security concepts, WAN and LANconcepts, routing protocols, Firewall security policies and good understanding on different types of attacks
  • Finally, can perform malware analysis, phishing analysis with the overall objective to ensure Confidentiality, Integrity and Availability of the systems, networks and data.
  • Cyber Security Foundation Professional Certificate
  • Splunk 7.

Certification

Security Primary : LogRhythm, DEVO, Azure Sentinel and Siemplify, IBM Qradar and Networking EDR : Falcon Crowdstrike Cloud : O365 and Cloud App

Security Ticketing Tools : Service Now, BMC and Landesk

Certification : Siemplify Certified SOAR Analyst (SCSA), ICSI |

  • CNSS Certified Network Security Specialist,
  • CISSP - Certified Information System Security Professional

Timeline

SOC ANALYST

National Bank of Canada

SOC ANALYST

CI Financial

SOC ANALYST

Capgemini

Masters - Supply Chain Management & Project Management

Montreal College of IT & St. Lawrence

Bachelor of Engineering - B.com Computers

Siva Sivani Degree College (Osmania University)
Ramesh Vinay Thota