Srujan Kumar

Research Scientist at Trellix
  • Claim this Profile
Contact Information
us****@****om
(386) 825-5501
Location
Bengaluru, Karnataka, India, IN

Topline Score

Topline score feature will be out soon.

Bio

Generated by
Topline AI

5.0

/5.0
/ Based on 1 ratings
  • (1)
  • (0)
  • (0)
  • (0)
  • (0)

Filter reviews by:

Yadapally Sravan Kumar

Srujan is excellent in his job, very focused and hard worker, who has a calm and collected approach to every challenge and gets the job done. Having helped train me up, I then had the pleasure of working with him as a shift partner. He was great at keeping the team on track, and would be a valuable team member.

You need to have a working account to view this content.
You need to have a working account to view this content.

Credentials

  • Wireshark Essential Training
    LinkedIn
    Dec, 2019
    - Nov, 2024
  • CEH
    -
    Sep, 2017
    - Nov, 2024
  • Arcsight Certified Security Analyst
    -

Experience

    • United States
    • Computer and Network Security
    • 700 & Above Employee
    • Research Scientist
      • Aug 2022 - Present

      • Proactively 'hunt' for Advanced Persistent Threats (APT) & newly emerging malware campaigns using OSINT • Perform static and dynamic malware analysis with analysis tools, create signatures with Fireye OpenIOC, and map attack stages with MITRE ATT&CK framework. • Knowledge on creating signatures for sophisticated malware campaigns such as Qakbot, Emotet, PlugX, Info Stealers, and Ransomwares, among others. • Perform an event triage analysis with RedLine to identify anomalous behaviour. • Experience in analysis of Microsoft O365 documents, LNK, Script files ( Powershell, VBScript & JScript )& PDF. • In-depth Knowledge on Windows sysinternal suite & Windows API calls. • Basic knowledge on reverse engineering using IDA disassembler & X32 debugger • Experienced in writing YARA signatures. Show less

    • United Kingdom
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Security Analyst
      • Mar 2019 - Aug 2022

      • Analyze threat intelligence (e.g. actors, tools, exploits, etc.) and determine techniques, tactics, and procedures (TTPs) of Threat Actors, including detailed technical analysis using Splunk. • Endpoint analysis experience with EDR tools such as CarbonBlack (CB), CrowdStrike, and Microsoft Defender ATP (MDATP) • Expertise in analyzing process graphs to determine Process Command Line, File Operation, Registry Changes, and Network Indicators • Experienced in Malicious Payload analysis using CyberChef • Basic knowledge on writing KQL queries • Knowledge in Network traffic analysis using Wireshark & Fiddler • Ability to develop scripts in Python and sound knowledge on Regular expressions Show less

    • United States
    • IT Services and IT Consulting
    • 700 & Above Employee
    • Security Associate
      • Sep 2018 - Mar 2019

      • Analyze data feeds for event detection, correlation and triage for further investigation using ArcSight SIEM. • Provide responses to customers who request assistance through our ticketing system • Identified violations of computer security policies and informed to client. • Delivered Security Bulletins for taking preventive measure and necessary detections. • Provided Weekly reports to senior management • Experienced in creating runbook and scope of work(SOW) documentation • Analyze data feeds for event detection, correlation and triage for further investigation using ArcSight SIEM. • Provide responses to customers who request assistance through our ticketing system • Identified violations of computer security policies and informed to client. • Delivered Security Bulletins for taking preventive measure and necessary detections. • Provided Weekly reports to senior management • Experienced in creating runbook and scope of work(SOW) documentation

    • United States
    • Computer and Network Security
    • 200 - 300 Employee
    • Arcsight Analyst & Admin
      • Feb 2015 - Sep 2018

      • Real time event monitoring and analysis of Security devices such IPS, Firewall, Operating system (Unix and Windows), Database, and Email Gateway etc. using SIEM device ArcSight in 24/7 environment • Address client queries within SLA and regular follow-up on security tickets till closure • Development of ArcSight resources such as Rules, Reports, Trends and Dashboards • Created custom use cases to detect Phishing attacks and unauthorized email access • Implemented filtering mechanisms to reduce inflow events to SIEM. Potential ~70GB/Day events are filtered out • Automated the process to notify client about potential security incidents using velocity templates • Onboarded 200+ security devices with SIEM and assisted client in troubleshooting • Unparsed RAW data is parsed using Flex Connectors. Implemented more than 10parsers in client environment • Continuously hunting for new use cases and improve standard operating procedures (SOP) used by the SOC Show less

Community

You need to have a working account to view this content. Click here to join now