Post Job Free

Resume

Sign in

Endpoint Security Google Cloud

Location:
Rochester, NY
Posted:
October 28, 2023

Contact this candidate

Resume:

PRIYANKA SOLLETI

New York, USA • 518-***-**** • ad0ool@r.postjobfree.com • https://www.linkedin.com/in/priya317/

Profile Summary

Cybersecurity Analyst with 5+ years of expertise in safeguarding critical assets against cyber threats. Adept at SOC operations, incident response, and Triage operations. Demonstrated proficiency in staying updated with the latest industry trends and emerging threats. (ISC) Candidate & CompTIA Security+ certified, committed to maintaining a secure digital environment and delivering tangible results.

TECHNICAL SKILLS

• Computer Forensics – Wireshark, FTK imager, Redline, Hash-me, G-kape

• Vulnerability Assessment - Crowdstrike, Tenable, Nmap, Maltego, Nessus, Metasploit, Greenbone Security, Rapid7 Nexpose, SNORT, Burp Suite, IDS, IPS

• Cybersecurity Frameworks - NIST, CIS, ISO/IEC 27001, PCI DSS, HITRUST, MITRE ATT & CK

• Incident Management - HPSM, Service Now

• Scripting Languages - Python, PowerShell

• Operating System - Windows XP/7/8/10, Ubuntu, OpenSUSE, Kali Linux, Security Onion, Parrot OS

• Networking - OSI Model, TCP/IP Model, LMT, Aircrack-ng

• SIEM - Splunk, IBM QRadar

• Cloud - AWS, Microsoft Azure, Google Cloud

• Endpoint Security - 0365 Security, Defender ATP

• Security Knowledge - Hashing, Encryption, Virtualization, Identity Management, Incident Response, Firewalls, Log Analysis, Vulnerability Assessment and Penetration Testing, Malware Analysis, OWASP, TCP, DNS, HIPAA, PCI, SOX

Professional Experience

Information Security Analyst Shrive Solutions Charlotte, NC, USA July 2023 – Present

• Designing, implementing, and managing our security infrastructure, including firewalls, threat analysis, intrusion detection systems (IDS), and intrusion prevention systems (IPS). These measures are crucial in protecting our systems from unauthorized access and potential threats.

• Successfully monitored and responded to security incidents, reducing incident response time by 30% and minimizing the impact of security breaches on the organization.

• Conducted OS hardening and implemented robust security measures for Windows and Linux systems, leading to decrease in successful cyberattacks and enhancing overall system security.

• Implemented regular application vulnerability scanning, identifying and patching critical vulnerabilities, resulting in a improvement in application security and reducing the risk of data breaches.

• Conducted security audits and assessments, ensuring compliance with industry security standards and best practices, and providing actionable recommendations for enhancing the organization's security posture.

• Managed and administered network security solutions, including firewalls, intrusion detection and prevention systems, and encryption tools, maintaining a secure network environment with zero successful intrusions in the last two years.

• Successfully deployed and maintained Barracuda spam filter and Exchange for email security, reducing spam and phishing attacks by and enhancing email communication security.

• Demonstrated proficiency in supporting Microsoft O365 suite of applications, ensuring uninterrupted access to critical business tools for 1000+ employees.

• Monitored events and triaged alerts across various security platforms, enabling proactive threat detection and response, and reducing mean time to detect security incidents.

• Coordinated patching and rebooting schedule of servers and client-owned systems, minimizing downtime and ensuring systems were up to date with the latest security patches.

• Actively managed and supported Active Directory, creating accounts, managing group memberships, and implementing Group Policy Objects (GPOs) to enforce security policies, resulting in improved access control and user management.

• Conducted risk assessments and gap analysis to identify security vulnerabilities and weaknesses in existing systems, leading to the implementation of targeted security requirements to mitigate potential risks.

• Developed and enforced policies and procedures for handling sensitive information, ensuring data confidentiality, integrity, and availability, and reducing the risk of data breaches or unauthorized access incidents.

• Demonstrated technical expertise in information technology, staying updated with the latest technological advancements and security trends, and leveraging this knowledge to implement robust security measures and strategies.

• Possessed in-depth technical knowledge of security technologies, such as firewalls, intrusion detection and prevention systems (IDPS), and antivirus software, effectively deploying and managing these tools to safeguard the organization's infrastructure from cyber threats.

Environment - Cisco, Splunk, WireShark, Alien Vault, NMAP, Snort, AWS, Nessus, Endpoint Security

Research Assistant University at Albany Albany, New York, USA August 2022 – May 2023

Evolution of Security vs. Defense vs. Deterrence in Geopolitical Cyber Conflict - Massachusetts Institute of Technology (MIT)

• As part of my master’s program curriculum under the prestigious InSure project at MIT, I had the privilege to contribute to cutting-edge research on the "Evolution of Security vs. Defense vs. Deterrence in Geopolitical Cyber Conflict."

• This project delved into the dynamic landscape of cyber warfare operation, analyzing interplay between security system, defensive measures, and deterrence frameworks in the context of geopolitical cyber conflicts.

Robust TTP Detection Analytic Development - MITRE ATT&CK

• Another significant research project I undertook during my master’s program was the "Robust TTP Detection Analytic Development," conducted in collaboration with MITRE ATT&CK.

• Focused on bolstering cyber threat detection capabilities, this research aimed to develop innovative techniques for identifying and countering adversarial Tactics, Techniques, and Procedures (TTPs) across diverse attack vectors.

Projects

Penetration Testing:

• Utilized Kali Linux and Metasploitable to aim at Windows 7 OS in a virtual environment followed by port

scanning with Nmap and Vulnerability Scan and Assessment with Nessus respectively.

• Established Metasploitable payloads on Windows 7 by implementing Remote Code Execution.

Intrusion Detection:

• Examined 4 workstations, 2 servers and activity logs to analyze the malicious access and malware execution.

• Utilized services like Hash me and Virustotal to determine the Hashes of suspicious processes and to check their

authenticity respectively.

Cyber Security Engineer DUOTRONIX Pune, India June 2018 – June 2022

• Successfully served as a Security Analyst in a 24/7 Security Operations Center (SOC) environment for over 2 years, effectively handling intrusion detection systems and global security incident notifications.

• Demonstrated exceptional performance in responding to time-sensitive security alarms and incidents, maintaining an average response time of less than 5 minutes for 95% critical alerts.

• Utilized strong critical thinking and judgment skills to make informed decisions while adhering to SOC tasks and procedures, resulting in a 98% accuracy rate in incident adjudication.

• Contributed to the development and implementation of new cutting-edge processes and procedures for physical security operations, leading to a 15% improvement in overall SOC efficiency.

• Engaged in mentoring and knowledge sharing within the team, assisting junior members in their career growth and development at different levels.

• Displayed outstanding customer service skills while handling email, phone communications, and chats, achieving a customer satisfaction rating of 95% based on feedback surveys.

• Played a key role in supporting data center security operations, ensuring compliance with service level agreements, policies, standards, and operating procedures, leading to zero major security breaches during the tenure.

Environment - Nmap, Linux, Cisco, Microsoft Defender ATP, Metasploit, NMAP, Wireshark, Kali, Linux

Education

MS in Digital Forensics and Cybersecurity State University of New York Albany, NY 3.76 GPA August 2022 – May 2023

• Completed rigorous coursework in advanced network security, cryptography, Metasploit and digital forensics, gaining specialized knowledge in identifying and mitigating cyber threats.

• Conducted an in-depth research project focusing on emerging cyber threats and their implications for critical infrastructure, demonstrating analytical and problem-solving skills in designing effective security devices.

• Actively participated in cybersecurity conferences and workshops to stay up to date with the latest industry trends and best practices.

• Developed strong Verbal and written communication skills to deliver detailed process documentation.

Post-Graduation Diploma in Management – Marketing & Business Analytics JAGSOM Bengaluru, India June 2020 – May 2022

• Acquired a comprehensive understanding of marketing principles and data analysis techniques, strategically integrating these skills into cyber security initiatives to enhance organizational risk assessment and threat prevention strategies.

• Successfully completed coursework tailored to cyber security challenges, including data privacy, digital marketing security, and consumer behavior analysis, fostering a unique blend of marketing insights and personal risk management expertise.

• Applied marketing analytics concepts to real-world cyber security scenarios, leading cross-functional teams to develop data-driven solutions that bolstered cyber resilience and fortified information systems against potential breaches.

Bachelor of Technology in Computer Science Sreyas Institute of Engineering & Technology Hyderabad, India September 2014 – May 2019

• Equipped with a strong foundation in programming languages, algorithms, and Linux Operating Systems, AWS, enabling the development of innovative software solutions and problem-solving in diverse computing environments.

• Engaged in challenging hands-on projects, such as designing and implementing web applications and databases, honing practical skills that facilitate efficient software development and system analysis.

Certifications

• CompTIA Security+

• (ISC) Candidate

EXTRA CURRICULAR

Literature • Environmental conservation • Culture • Yoga • Travel

References will be gladly provided upon request.



Contact this candidate