RAJESH CHINTALA
Mobile: +919*********.
******.*********@*****.***
OBJECTIVE: -
To work in a competitive world, fulfilling the organizational needs and to shape up my professional career with the latest technological and managerial innovations. To be best at my job and grow in a robust environment to further my career that makes the best use of my abilities to serve the organization and build up a strong base for my future. SUMMARY OF EXPERIENCE: -
As a IT Security professional having 6 years of experience in Cyber Security Operations(SIEM) and administration and troubleshooting of various security technologies. Currently designated as a Cyber Security Analyst in Synaptics and responsible for internal hosting and distributed security infrastructure technical implementation and troubleshooting. Adept at people and maintaining a healthy relationship with other workforces, and with my clients. PROFESSIONAL EXPERIENCE: -
1. Organization : Synaptics.
Designation : Cyber Security Analyst
Duration : March 2017-Till date
ROLES & RESPONSIBITIES: -
• Monitoring and Performing ongoing the threat analysis using Intrusion Detection Systems (IDS), Splunk for Continuous monitoring of the Synaptics network and endpoint security infrastructure to identify security attacks and threats for remediation/suppression.
• Monitoring the security Incidents (e.g., Antivirus, Sourcefire, Spam emails and Crowdstrike EDR) and changes to highly sensitive computer security controls to ensure appropriate systems.
• Identifying the potential IT security incidents and escalating the information to appropriate teams.
• Primary point of contact for managing the SOC services, ensuring alerts raised to the SIEM tool followed through and investigting.
• Conduct vulnerability analysis and assessments across the entire Synaptics IT enterprise in support of operations and maintenance activities.
• Monitoring the current reports of computer viruses to determine when to update virus protection systems.
• Implementing the technical security solutions during engagements with NOC and EUS teams. 2. Organization : CDK Global.
Designation : Security Operations Analyst
Duration : September 2015 – March 2017
ROLES & RESPONSIBITIES: -
• Using Splunk for Continuous monitoring of the CDK Global network and endpoint security infrastructure.
• Documenting the computer security and emergency measures policies, procedures, and tests.
• Aggregating, correlating, and analyzing log data from network devices, security devices and other key assets using Dell Secureworks SIEM technologies.
• Investigate potential or actual security violations or incidents to identifying issues and areas that require new security measures or policy changes.
• Using Shell scripting to automate repetitive tasks in UNIX server level implementation.
• Providing weekly metrics on status of monitoring infrastructure across CDK Global data centers and associate offices.
• Implementing technical security solutions during engagements with NOC and EUS teams. 3. Organization : Phoenix American Sales Focus Solutions India Pvt. Designation : IT Administrator/Data Analyst
Duration : May 2014 – September 2015
ROLES & RESPONSIBITIES: -
• Configuration & Maintenance of Linux servers and Firewalls (Cyberoam, Cisco ASA, SA520).
• Configuration of Microsoft Office365 Mailing solutions. (Managing Mail IDs, Mail forwarding’s, adding Domains).
• Monitoring events received from customer's monitored servers, and then take appropriate action based on customer's security policy.
• Escalating the problem to the Technical Specialist / Team Lead(s) if not solved, provide L2 support to the users; handling Remote support, taking backup & restoration.
• Configuring various basic & Enterprise Wi-Fi devices (D-Link, Netgear and Belkin).
• LAN/WAN design and implementation, Troubleshooting all reported LAN, WAN and network security related problems.
• Performing analysis of log files. Includes forensic analysis of system resource access. 4. Organization : Eagle Claw Consulting India Pvt. Designation : Network Security Analyst
Duration : Feb 2012 - April 2014
ROLES & RESPONSIBITIES: -
• As a Network Security analyst, my job is to see that the security policy is implemented and responsible for various consulting services to include installation, configuration.
• Administration and troubleshooting on various platforms like Windows, Linux, networking and hardware including routers, switches and related LAN/WAN equipment.
• Maintaining maximum availability of supported services for clients and customers.
• Handling IT infrastructure level queries, resolving client complaints, Network troubleshooting. Configuring user accounts and groups for employees in both Linux and Windows. ACADEMIC CREDENTIALS: -
Bachelor of Science (M.P.CS) in Mahathi Degree College affiliated with (Andhra University). Intermediate in M.P.C stream in Mahathi Junior College Visakhapatnam AP. Secondary School Certificate (10th) in Z.P High School Venkatapuram, Visakhapatnam. CERTIFICATION: -
Certified Ethical Hacker (CEH) certification from the EC-Council. Certified Information Security Consultant (CISC) from INSTITUTE OF INFORMATION ECURITY. TECHNICAL SKILLS: -
Hands on experience in operating system platforms:
Linux OS: Red Hat (Shell scripting), cent OS, Backtrack 5 R3, Kali Linux, etc.
Windows OS: Windows (2003, 2008 R2 Servers and Windows XP, 7, 8).
Wireless OS: Wi-Fi Slacks used for Wireless network testing and rogue AP identification.
SIEM: Hands on experience in Arcsight, Dell Secure works, Splunk SIEM tools.
Vulnerability Assessment: Hands on experience in Nessus, QualyGuard, OpenVAS. Networking and Network Security Administration:
o Possess a comprehensive understanding of the TCP/IP protocol, security architecture. o Conduct network vulnerability assessments using tools to evaluate attack vectors, identify system vulnerabilities and develop remediation plans and security plan and procedures. o Wireless controller and access point network security testing and patch updating using basic standards like 802.11(a, b, g, i, n Air modulation techniques with Wi-Fi Slacks). SIEM operations:
o Reviewing security events that are populated in a Security Information and Event Management.
(SIEM) system using Arcsight, Dell secure works, Sourcefire, Crowdstrike, Symantec Endpoint. o Analyzing the variety of network and host-based security appliance logs (Firewalls, Sourcefire IDS etc.) to determine the correct remediation and abused IP black-listing. o Developing cyber security analytics and threat intelligence using multiple data sources using SIEM. Tools used for network and server Monitoring and Vulnerability Assessment: o Nessus, Qualys-Guard vulnerability scanner is used for identifying the network level vulnerabilities. o Reaver tool used for wireless enumeration testing and kismet, bottle feeding tools used for strong password testing and wireless rouge clients.
o Monitoring ArcSight Dashboard and Handling the suspicious emails received from the CSIRP. o Nmap used for Operating System Fingerprinting, to scan hosts to discover open ports and to identify the hosts availability on the network.