Bio
Credentials
-
Certified Ethical Hacker (CEH)
EC-CouncilMar, 2022- Apr, 2026 -
Cyber Threat hunting
Active CountermeasuresJan, 2022- Apr, 2026 -
Networking Essentials 2.0
CiscoOct, 2021- Apr, 2026 -
Agile Explorer
IBMApr, 2021- Apr, 2026 -
CompTIA Security+ :Viruses,Threats and Compromise Indicators
UdemyApr, 2021- Apr, 2026 -
Cybersecurity Essentials
CiscoApr, 2021- Apr, 2026 -
Tableau
Great LearningJan, 2021- Apr, 2026 -
Cybersecurity Fundamentals
IBMDec, 2020- Apr, 2026 -
Computer Vision Based Advanced Cloud Security Using Face Recognition
International Journal of Advanced Science and TechnologyJul, 2020- Apr, 2026 -
CompTIA Security+
CompTIANov, 2022- Apr, 2026 -
Microsoft certified: security operations analyst associate
MicrosoftJan, 2024- Apr, 2026
Experience
-
Ntirety
-
Vancouver, British Columbia, Canada
-
Cyber Security Analyst
-
Nov 2023 - Present
-
Vancouver, British Columbia, Canada
• Creating/Managing firewall rules• Managing anti-virus endpoint tools• Performing event correlation analysis on potential threats identified through our SIEM.• Configuring/Managing log management• Configuring/Managing file integrity monitoring• Performing vulnerability scans and remediation of identified risks• The methodology & analysis of identifying compromised servers.• Performing rule tuning in our SIEM for improved detection capabilities• Interact with customers by phone, chat, or trouble ticket on any customer facing security issues.• Investigate, document, and assess security breaches and other cyber security incidents.• Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.• Prepare security reports for customer business insights reviews to support our guidance level agreements. • initiatives.• Identify and fix detected vulnerabilities to maintain a high-security standard.• Work with other technology teams and customers to perform tests and uncover network or other vulnerabilities.• May be relied upon as a technical point of contact during Escalated Events relating to security.• Review, investigate and respond to any external “abuse” complaints coming from our IP space.• Develop best practices for IT security.• Research security enhancements and make recommendations to management.• Handle escalated internal or customer security issues from support or other operations team.• Takes part in any security-oriented projects or critical initiatives.• Stay up to date on information technology & security news, trends, and standards.• Deliver an exceptional customer experience every day.• Other duties as identified or assigned.
-
-
-
CIBC
-
Vancouver, British Columbia, Canada
-
SOC Triage ANALYST
-
Jan 2022 - Nov 2023
-
Vancouver, British Columbia, Canada
• Closely collaborated with the incident response team and investigations teams to gain an understanding of cybersecurity incidents and conduct technical analyses.• Responsible to providing on call support during incident related events, such as email breaches, compromised accounts, network access issues and malware removal.• Involved investigating email breaches by examining sign in logs, audit logs, Azure AD activities and user inboxes to identify any signs of activity.• Enhance security measures, I ensured that users changed their passwords regularly and enabled Multi Factor Authentication (MFA).• I conducted analyses of incidents, data breaches and malware attacks to determine their impact scope. Recommended appropriate response actions.• Using Azure Sentinel tool, I actively monitored security events while diligently processing reports of activities that required attention.• As a part of the SOC Triage team, I managed tickets efficiently. Promptly responded to alerts by investigating potential security incidents.• Utilized Microsoft Defender as Endpoint Detection and Response (EDR) to investigate alerts further. This involved identifying the sources of threats and contributing to the remediation process.• Actively engaging in threat hunting techniques allowed me to detect malicious footholds efficiently. This helped facilitate remediation efforts.• By leveraging tools within our enterprise architecture framework, I conducted checks on suspicious events while providing comprehensive post detection hunting reports following any data breaches.• Implementing application whitelisting protocols played a role, in safeguarding businesses from virus’s ransomware attacks and other forms of software.• Good knowledge in Vulnerability Scanning by working with teams specializing in tools and technology.
-
-
-
-
Security Engineer
-
Jan 2020 - Dec 2021
• Contributed to the creation and dissemination of finished cyber threat intelligence reports, incident response plans, vulnerability management strategies, and security briefings.• Played a key role in the selection and procurement of Tenable Nessus, including assessing licensing needs.• Worked the execution of Nessus implementation, ensuring seamless integration with existing systems. Trained IT and security teams on Nessus usage, scan result interpretation, and remediation processes.• Implemented custom plugins and scripts to enhance Nessus functionality and reporting. Regularly updated Nessus software and plugins to maintain optimal performance and accuracy.• Produced high-quality oral and written reports, effectively communicating complex technical matters to audiences ranging from peers to senior management.• Recognized and analyzed potential, successful, and unsuccessful intrusion attempts and compromises through thorough event detail and summary information analysis.• Ensured the integrity and protection of networks, systems, and applications by technically enforcing organizational security policies and monitoring vulnerability scanning devices.• Demonstrated knowledge of relevant frameworks, standards, and best practices such as NIST Cybersecurity Framework, PCI-DSS, CIS Critical Security Controls, MITRE ATT&CK, and Cyber Kill Chain.• Investigated, collected, and analyzed malicious phishing emails, domains, and IPs using Open-Source tools and recommended appropriate blocking measures based on analysis.• Analyzed various network and host-based security appliance logs, including Firewalls, NIDS, HIDS, and Sys Logs, to determine the correct remediation actions and escalation paths for each incident.
-
-
Education
-
2016 - 2020SRM University
Bachelor of Technology - BTech, Computer Science
Suggested Services
This profile is unclaimed. These are suggested service rates with 0% commision upon successful connection
Industry Focus. “IT Services and IT Consulting”
Need a custom project? We'll create a solution designed specifically for your project.
References
Social Profiles
Community