Profiles search
MUKESH BABU SUNDARA BABU
Information Security Engineer at Rockefeller University
Harrison, NJ, United States
Details
Education:
Master’s Degree
Computer Systems Networking and Telecommunications
New Jersey Institute of Technology
2013 : 2015
Computer Systems Networking and Telecommunications
New Jersey Institute of Technology
2013 : 2015
Experience:
2016 : Present
Rockefeller University
Information Security Engineer
1. INCIDENT RESPONSE [HUNT TEAM] :
--Detonating and analyzing of malwares including Ransomwares, Macro malwares, Cryptolockers, Trojans.
--Providing detailed report on the malware spreading through the network and provide steps for defensing the network at various levels including firewalls, IPS/IDS, Mail Exchange servers and proxy servers.
2. SECURITY INFORMATION AND EVENT MANAGEMENT - McAfee ESM :
--Integrating varios devices including Windows & Unix Servers, firewalls, routers, IDS/IPS, Proxy servers, DNS servers, Bit9 & Carbon Black, CyberArk, etc.
--Customizing alarms, creating Advanced Syslog Parser rules, Correlation rules, etc.
--Maintaining and performing regular health check on other components of ESM including ELM, ACE, ADM, DEM.
3. FIREWALL MANAGEMENT - PALO ALTO :
--Performing administrative tasks with Palo Alto Networks(Panorama) including Security, NAT policy definitions; application filtering; Regional based rules; URL filtering, Data filtering, file blocking, User based policies.
4. END POINT SECURITY - BIT9 AND CARBON BLACK :
--Defining policies and classifying devices as per the policies.
--Monitoring the critical Bit9 activities including files executed, files blocked, system management processes and actions by Console Users.
--Monitoring the watch-list for various sources including Virus Total and checking if there are any signs of potential threats on end points using Carbon Black.
5. VULNERABILITY SCANNING FOR PCI COMPLIANCE - RAPID7 NEXPOSE :
--Setting up scan profiles, scheduling scan jobs, creations and analysis of scan reports, working with operations and compliance teams to remediate findings and keep the environment clean/compliant with PCI standards.
6. FILE INTEGRITY MONITORING - TRIPWIRE ENTERPRISE :
--File Integrity Monitoring through TW agents installed on devices in the environment to meet PCI standards.
--Analyzing FIM reports on daily / weekly basis and fix any agent-related issues.
2015 : 2016
Belk
Security Operations Center Analyst Level 2
2014 : 2015
Comcast
Security Response Center - Analyst
Rockefeller University
Information Security Engineer
1. INCIDENT RESPONSE [HUNT TEAM] :
--Detonating and analyzing of malwares including Ransomwares, Macro malwares, Cryptolockers, Trojans.
--Providing detailed report on the malware spreading through the network and provide steps for defensing the network at various levels including firewalls, IPS/IDS, Mail Exchange servers and proxy servers.
2. SECURITY INFORMATION AND EVENT MANAGEMENT - McAfee ESM :
--Integrating varios devices including Windows & Unix Servers, firewalls, routers, IDS/IPS, Proxy servers, DNS servers, Bit9 & Carbon Black, CyberArk, etc.
--Customizing alarms, creating Advanced Syslog Parser rules, Correlation rules, etc.
--Maintaining and performing regular health check on other components of ESM including ELM, ACE, ADM, DEM.
3. FIREWALL MANAGEMENT - PALO ALTO :
--Performing administrative tasks with Palo Alto Networks(Panorama) including Security, NAT policy definitions; application filtering; Regional based rules; URL filtering, Data filtering, file blocking, User based policies.
4. END POINT SECURITY - BIT9 AND CARBON BLACK :
--Defining policies and classifying devices as per the policies.
--Monitoring the critical Bit9 activities including files executed, files blocked, system management processes and actions by Console Users.
--Monitoring the watch-list for various sources including Virus Total and checking if there are any signs of potential threats on end points using Carbon Black.
5. VULNERABILITY SCANNING FOR PCI COMPLIANCE - RAPID7 NEXPOSE :
--Setting up scan profiles, scheduling scan jobs, creations and analysis of scan reports, working with operations and compliance teams to remediate findings and keep the environment clean/compliant with PCI standards.
6. FILE INTEGRITY MONITORING - TRIPWIRE ENTERPRISE :
--File Integrity Monitoring through TW agents installed on devices in the environment to meet PCI standards.
--Analyzing FIM reports on daily / weekly basis and fix any agent-related issues.
2015 : 2016
Belk
Security Operations Center Analyst Level 2
2014 : 2015
Comcast
Security Response Center - Analyst
Company:
Rockefeller University
Years of Experience:
9
Spoken Language:
English, Tamil, Telugu
Skills
ArcSight, ASDM, Backtrack, Bit9, C++, Carbon Black, Checkpoint, Cisco ASA, Cisco VPN, CSS, ePolicy Orchestrator, ESM, HTML, Ironport, JavaScript, JIRA, JUNOS, logLogic, Malware Analysis, Matlab, McAfee, Metasploit, Microsoft Excel, Microsoft Office, Microsoft Word, Nessus, NeXpose, Palo Alto Networks, Perl, PGP, Photoshop, PowerPoint, Putty, Python, RSA Security, RSA Tokens, Secure CRT, Security Information and Event Management (SIEM), SIEM, Sourcefire, Tripwire, Triton, VMware, Vulnerability Assessment, Vulnerability Scanning, Websense, Wireshark, C, Research, Teaching, Editing, Public Speaking, English, NAT, Tcpdump, Juniper Technologies, Nokia IPSO, Vyatta, Service Catalog, Nslookup, Oracle VM, IPSec, SSL