Trainer | IT Leader | Cyber Security | Tester | Speaker
Cyber Security Professional
Build and operate cyber security programs to protect customers and enterprises.Leverage system and network security for protection against threats and vulnerabilities.
Passionate and dedicated towards cyber security solutions with artificial intelligence (AI) for advance protection against general/custom/AI based threats.
"Dedicated to create and maintain a safe cyberspace for organizations and individuals.”
Microsoft Certified Professional
Developer (MCPD) | Microsoft
Certified Solutions Developer (MCSD)
C|EH Certified Ethical Hacker V10
C|HFI Computer Hacking Forensic Investigator
L|PT Licensed Pe*******on Tester
TECHNICAL
PROFICIENCIES:
JavaScript, JQuery, HTML, HTML5, CSS, CSS3, Web Programming Skills, E-Commerce, Teamwork, Verbal Communication,
cross-browser compatibility, Web User Interface Design (UI), Security Principles, Object-Oriented Design, Web Services (REST/SOAP), Multimedia Content Development, API's
Video Production Professional, Java C++ Introduction, Data Base Manager, Web Designing, Post Production Professional, Adobe software specialization, Hard & Networking, 3d Max and Auto Cad (with 3d Drawing).
Cyber Security Analyst
· Ensuring customer and employee data security against threats with data de-identification.
· Conducting data loss prevention with and implementing appropriate measures.
· Prioritize and data loss scan on repositories based on pre-defined criteria and policies.
· Analyzing potential privacy violations to identify false positives and policy violations with immediate remediation.
· Conducting SIEM scans and generating dashboard/reports.
· Identifying vulnerabilities through scans and pe*******on tests to report the issues.
· Scanning and Identifying Indicators of Compromise (IOC’s).
· Conducting OSINT and TECHINT reconnaissance.
· Performing threat intelligence and implementing Cyber Kill Chain defense against APT.
· Employing cyber modeling techniques to identify malicious threats and activities.
· Analyzing network traffic for malicious or abnormal activity for attack vectors.
· Identify adversary's Tactics, Techniques, and Procedures (TTPs) for technical mitigation strategies for preventing, controlling, and isolating incidents.
· Performing malware analysis using different malware analysis methodologies.
· Performing digital forensics to identify suspicious malicious content.
· Conducting intrusion detection and prevention. Performing log analysis and identifying malicious activities.
· Creating risk matrix as per defined criteria.
Technical Proficiency
Artificial Intelligence | Machine Learning | Natural language processing | Data Loss Prevention | Data De-Identification | Data Classification| End Point Protection | Threat Modeling | Advanced Threat Protection | Cyber Kill Chain | APT | Metasploit | Malware Analysis | Pe*******on Testing | Network Security | System Security | Digital Forensics | Cryptography | Vulnerability Scanning | Ethical Hacking | Risk Assessment | Incident Response
Computer Proficiency:
Artificial Intelligence:
Windows, Linux-RHEL and Kali
Machine learning, Natural language processing, TensorFlow / Azure
Languages & Technologies:
CSS, Hibernate, HTML, Java Core (JSE) / Advance (JEE), JavaScript, JDBC, jQuery, JSON, JSP, MySQL, Python, Servlet and WebLogic Sever
Cyber Security:
Cyber Kill Chain |Threat Modeling & Protection | Pe*******on Testing-Metasploit framework, Burp Suite, etc. | IDS/IPS-SNORT | SIEM-Splunk, IBM QRadar | Vulnerability Scanner-Nessus / HPE Fortify & WebInspect / OpenVas |Port Scanner-Nmap |Endpoint Security- Symantec (SEP) 14| Symantec Advance Threat Protection (ADT) 2x |Data Loss Prevention-Symantec (DLP) 14| Console-McAfee ePO 5.x |Data De-Identification |Data Classification-Boldon James | Risk Management Framework-NIST SP 800-30 rev-1 & SP 800-37 rev-1| Incident Response-NIST SP 800-61 rev2 | Security Framework-NIST SP 800-53 rev-4 | Honeypot-HoneyDrive | VPN protocols| Web Proxy-Bluecoat, Squid| Patch Manager-Solarwinds | Packet capturing and analysis-Wireshark, WinHex, TCPdump| Netflow- Colasoft Capsa Network Analyzer | Next Generation Firewall (NGFW)- Palo Alto| Web Application Firewall (WAF)-Fortinet FortiWeb | OWASP Top-10 and other attack vectors| OSI Model| Protocols-TCP/IP, UDP, LDAP, SNMP, NetBIOS, Telnet, SSH, SSL, TLS, etc.| Static malware analysis-OfficeMal Scanner, BinText, CFF Explorer, PEview, PEStudio, Dependency walker |Malware behavior/Dynamic malware analysis- InetSim, and FakeDNS and other required technologies.
Digital Forensic:
FTK imager, EnCase, OSForensics, The Sleuth Kit (TST), and IrfanView
RECENT RESEARCH:"Reverse engineering and vulnerability analysis using AI/machine learning to automate system and network security for advanced cyber protection".
Award Winner 2017 Find WhatsApp Vulnerability DDOS Attack Got Cash Prize From WhatsApp.