Harsh Narayan
Cyber Security Researcher at Bores Group Ltd- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Chris Bore
Harsh is working with us on a project to assess the value of a mathematical matrix treatment to reduce an attack vector database to manageable dimensions for executive decision making. He has clearly grasped the mathematical and cyber-security principles and is helping to clarify and advance the project: also to independently assess its value in practical contexts: demonstrating practical pragmatic application of cyber security experience in an applied context. He is also self-motivated and diligent as well as responsive to circumstances and guidance without needing micromanagement.
Chris Bore
Harsh is working with us on a project to assess the value of a mathematical matrix treatment to reduce an attack vector database to manageable dimensions for executive decision making. He has clearly grasped the mathematical and cyber-security principles and is helping to clarify and advance the project: also to independently assess its value in practical contexts: demonstrating practical pragmatic application of cyber security experience in an applied context. He is also self-motivated and diligent as well as responsive to circumstances and guidance without needing micromanagement.
Chris Bore
Harsh is working with us on a project to assess the value of a mathematical matrix treatment to reduce an attack vector database to manageable dimensions for executive decision making. He has clearly grasped the mathematical and cyber-security principles and is helping to clarify and advance the project: also to independently assess its value in practical contexts: demonstrating practical pragmatic application of cyber security experience in an applied context. He is also self-motivated and diligent as well as responsive to circumstances and guidance without needing micromanagement.
Chris Bore
Harsh is working with us on a project to assess the value of a mathematical matrix treatment to reduce an attack vector database to manageable dimensions for executive decision making. He has clearly grasped the mathematical and cyber-security principles and is helping to clarify and advance the project: also to independently assess its value in practical contexts: demonstrating practical pragmatic application of cyber security experience in an applied context. He is also self-motivated and diligent as well as responsive to circumstances and guidance without needing micromanagement.
Experience
-
Bores
-
United Kingdom
-
Security and Investigations
-
1 - 100 Employee
-
Cyber Security Researcher
-
Jun 2023 - Present
• Working on a matrix maths approach to dimension-reducing cyber threat databases. • The dimension of the data is the number of variables that are measured on each observation. • Due to the advancement in data collection and storage capabilities there is an overload of information. • The aim of this project is to reduce the dimension of large detailed unwieldy cyber threat, attack and vulnerability databases such that they become useful other than for very detailed threat analysis. • This approach is similar to a Design Structure Matrix which is used routinely in for example logistics and finance. Show less
-
-
-
Hotel Narayan Aman
-
Patna, Bihar, India
-
Operations Manager
-
Mar 2019 - Sep 2022
• Functioning as an IT Manager, responsible for system maintenance, upgrades, patch management, and providing end-user support. • Overseeing day-to-day operations across multiple sites, ensuring SOP compliance, conducting security audits, and delivering staff training. • Managing EPOS & Stock system maintenance, programming, and conducting multi-site profit/loss audits. • Conducting team training in critical areas: PCI-DSS, security protocols, cash handling, standard operating procedures, cellar management, customer service, management reports, manager training, health and safety training, IT systems, and equipment training. • Coordinating repairs & maintenance management, collaborating with contractors for efficient handling of tasks. • Managing teams, including staff development, task allocation, formulating staff rotas, and performance management. • Managing payroll and budget planning, while supervising and approving weekly and monthly site schedules. Show less
-
-
-
LCP
-
United Kingdom
-
Financial Services
-
700 & Above Employee
-
Onsite Engineer
-
Jan 2017 - Aug 2017
• Network implementation and administration. • Server maintenance, patching and hardening. • 2FA deployment and auditing for all environments. • Monitoring emails and files for malicious contents. • Deploying and updating company wide security policies. • Conducting a company-wide hardware audit of the devices loaned. • Network implementation and administration. • Server maintenance, patching and hardening. • 2FA deployment and auditing for all environments. • Monitoring emails and files for malicious contents. • Deploying and updating company wide security policies. • Conducting a company-wide hardware audit of the devices loaned.
-
-
-
Wanstor
-
United Kingdom
-
IT Services and IT Consulting
-
100 - 200 Employee
-
Service Desk Analyst
-
Aug 2016 - Aug 2017
• 1st line support on helpdesk. • Resolving support tickets, such as Firewall, Server, Identity Access Management, M365 issues. • Communicating troubleshooting steps with over 125 clients. • Creating documentation for various clients for frequent occurrences for which other engineers might not have a solution. • Attending client sites when required. • 1st line support on helpdesk. • Resolving support tickets, such as Firewall, Server, Identity Access Management, M365 issues. • Communicating troubleshooting steps with over 125 clients. • Creating documentation for various clients for frequent occurrences for which other engineers might not have a solution. • Attending client sites when required.
-
-
Education
-
Lancaster University
Master's degree, Cyber Security -
University of Kent
Bachelor's degree, Computer Science -
Delhi Public School Patna