Kaushik Anand Reddy
Availability to Interview: Immediately
Availability to Start: Immediately and available for Relocation *******************@*****.***
An Information Security Analyst with focus on Cyber security, continuous monitoring, access control and compliance. Performed advanced cyber security operational monitoring and analysis of security events Ex: Security information monitoring tools, network and host based intrusion detection tools, system logs such as windows, mainframes applications and databases with different security technologies i.e, SIEMS
(McAfee, RSA) cisco, IronPort proxy, McAfee end point such as VSE, HIPS, McAfee encryption, remediation of workstation and servers for antivirus with ePO. Also, data protection technologies which includes McAfee DLP, Imperva database monitoring and boundary protection technologies which include DDoS, FireEye, Splunk, McAfee NSP, Mojo for WIPS.
EDUCATION:
Master of Science in Computer Science May 2017
Wright State University, Dayton, Ohio
Bachelor of Engineering in Electronics and Communication June 2015 Visvesvaraya Technological University, India
CERTIFICATIONS:
Pursuing CEHv9
TECHINICAL SKILLS:
McAfee ePO, McAfee ESM SIEM, RSA SA, DLP, Drive Encryption, McAfee nDlp, Imperva DAM, WIPS, Proxy, Splunk, Akamai(WAF), Cisco ISE, Airtight Mojo (WIPS), McAfee NSM(IPS), PGP. EXPERIENCE:
INFORMATION SECURITY ANALYST - Intern
US Bank (Wipro) Jan 2017 to April 2017
• Correlated data from intrusion and prevention systems w/data from sources. Ex: Web server, DNS logs to identify misuse, malware or unauthorized activity on networks, Communicated and escalated issues, incidents required by process.
• Monitored and investigated DLP and endpoint events; Utilized and understood AV, Fraud or signature matching technologies. Customized intrusion detection system and other tool signatures to maximize the value of event logs and minimize number of false-positives.
• Participated in the computer security incident response team efforts and other mitigation strategies used in security operations.
• Executed response and mitigation procedures for a myriad of potential security incidents escalated from US bank’s Tier 2 SOC and create reports to reflect on our detection and mitigation strategies.
• Monitored and analyzed real-time security alert analysis and (DDoS) mitigation response attacks using tools.
• Regularly worked with Computer Security Incident Response to discuss and potential escalate critical incidents after initial triage.
• Performed analysis on data from systems to identify unexpected or malicious activity across channels.
• Helped analyzing security tools and systems and reports on security and performance. Provided recommendations on vendor tools.
• Stayed abreast of current technologies, developments, security compliance requirements, standards and industry trends to help achieve the goals of the department.
• Worked with compliance teams to support security and privacy audits and helped to develop a mitigation strategy. Worked to obtain and compile necessary documentation and evidence for all this position but are not intended to be complete or all-inclusive listing.
• Analyze system logs and identify potential issues with computer systems.
• Maintained and modified hardware and software components, content and documentation.
• Initiated and integrated new technologies into existing data center environments.
• Communicate and troubleshoot technical inquiries of coworkers and clients.
• Research methods to improve security through encryption to maintain security of information.
• Create and maintain high-quality documentation of all relevant specifications, systems, and procedures.
• Assist in the development of processes to maintain business continuity and recovery standards for endpoint systems and networks.
• Excellent exposure to Database, VPN technologies, and Firewalls. INFORMATION SECURITY ANALYST Mar 2013 to May 2015
Videotronix - Bangalore
Videotronix, serving voice, private data networks to enterprises in Karnataka. It provides the state-of-the- art digital communications technologies to small and medium enterprises and offers solutions for corporate clients based on ubiquitous, value-priced, high-speed data services over a nationwide broadband network which added a value for my Internship.
• Researching, analyzing and understanding log sources from security and networking devices such as firewalls, routers, anti-virus products, and operating systems
• Performed real-time proactive Security monitoring and reporting on various Security enforcement systems, such as NITRO (SIEM), Anti-virus, Internet content filtering/reporting, malware code prevention, Firewalls, IDS& IPS, Web Security, Anti-spam, etc.
• Provided oversight of all changes to corporate firewalls, including pre-implementation analysis and approval, and post-implementation auditing.
• Identifying and remediating any threats and vulnerabilities as a Security Monitoring (SOC), Triage and Escalation to T2.
• Documenting incident results and reporting details through ticketing system
• Escalating issues to Tier-2 and follow up as required.
• Identifying and remediating any threats and vulnerabilities.
• Monitoring DDoS portals and alerting the team by reporting them using pager and opening the bridge call.
• Providing half an hour updates on traffic by monitoring portals from ISP’s.
• Triaging emails sent by internal users depending on the categories and responding to the customers after investigating the emails.
• PEM (Portable Electronic Media) alert monitoring.
• Subpoena requests, Credit Card Number Analysis to prevent fraud on external customers.
• Investigated DDoS attacks, Fire-eye, Source-fire, malwares, web sense event that are prone. Connectors are set for the entire IDS/IPS appliance.
• Executed on appropriate mitigation strategies for identified threats.
• Provided Rotation 24/7 On Call support.
• Formulated and configured Logger appliances and analyzed system anomalies.
• Managed, upgraded and maintained operational data flows and McAfee SIEM platforms.
• Maintained and modified hardware and software components, content and documentation.
• Created and documented reports, rules, trends and Dashboard.
• Provided guidance for equipment checks and supported processing of security requests.
• Experience in Network Intrusion detection/Intrusion Prevention System and Firewalls.
• Utilize Security Information and Event Management (SIEM), Intrusion Detection & Prevention
(IDS / IPS), Data Leakage Prevention (DLP), forensics, sniffers and malware analysis tools
• Security Incident handling, SIEM (ESEM) using RSA Envision/Arc Sight products.
• Excellent exposure to Database, VPN technologies, and Firewall
• OS under LAN and WAN environments.
• Implementation of name resolution using WINS & DNS in TCP/IP environment.
• Negotiate VPN tunnels using IPsec encryption standards and configured and implemented site- to-site VPN, Remote VPN.
• Conduct research on IDS alerts/traffic and Vulnerability/Vendor threats/LogMonitoring/Vulnerability Scanning.