Details
Cyber Security Analyst
• Working in a team environment with Agile methodology, transformed complex concepts into simple, elegant, and
approachable experiences, services, and products
• Conducted regular vulnerability assessments using tools such as Nessus and OpenVAS, implementing effective remediation
strategies that resulted in a 30% reduction in potential threats.
• Monitored network traffic using tools like Wireshark and Snort, identifying and responding to anomalous activities and
potential security threats.
• Assisted in the deployment and configuration of security technologies, including IDS/IPS and SIEM solutions.
• Staying informed about the latest cybersecurity trends and technologies through continuous learning and professional
development.
• Assisted in the administration and maintenance of security systems, including firewalls and antivirus solutions.
• Use continuous monitoring results to iteratively scope and tailor security controls based on risk levels and business mission/
goals for the assessment project.
ApexInfoLab, India | June 2019 - Aug 2021
Cyber Security Analyst
• Monitored network traffic and analyzed security logs to detect and respond to potential security breaches.
• Assisted in the administration and maintenance of security systems, including firewalls and antivirus solutions
• Contributed to the development of security policies, procedures, and standards
• Installed software, modified and repaired hardware and resolved technical issues increased efficiency by 15%
• Involved in troubleshooting of DNS, DHCP, and other IP conflict problems.
• Managed email and cloud storage accounts using Microsoft exchange and OneDrive, enhancing data security.
• Developed and coordinated proactive Cyber CI projects and activities to detect attempts by foreign intelligence services to
target Congressional resources.
• Analyzed network traffic flows using Wireshark to troubleshoot various network issue
About
● Around 3 years of experience as a Cybersecurity Analyst, specializing in safeguarding digital assets through the application
of cutting-edge security protocols and technologies.
● Ability to configure, maintain and design network security solutions including firewalls (Checkpoint, Cisco ASA & Fortinet),
IDS/IPS (Cisco, Checkpoint & Sourcefire), VPN, ACLs and Web Proxy etc.
● Understanding of firewall rule creation and pushing policy in enterprise environment, IP traffic flow, analyzing and capturing
of live traffic using Snoop, TCPDUMP, Wire shark and FW monitor.
● Proficiency in vulnerability assessment and penetration testing using various tools such as Burp Suite, OpenVAS, Snort,
Nmap, Nessus and TCPDUMP.
● Ability to developing and testing of Content (Correlation rules, Reports, Dashboards and Asset modelling) and integration
and testing of multiple feeds like databases, Applications and network and Security devices logs to SIEM tools for threat
detection