Post Job Free

Resume

Sign in

Endpoint Security Information

Location:
McKinney, TX
Salary:
95000
Posted:
October 28, 2023

Contact this candidate

Resume:

Sandeep

ad0ouz@r.postjobfree.com

+1-470-***-****

PROFESSIONAL EXPERIENCE

A Professional Expert and Technical Architect with 10+ Years of IT experience which including 5.2 years in Information Security, with security operations including Incident management, Intrusion detection and prevention, Endpoint security and logs analysis through SIEM. Experience on working in operations of SOC team, offering log monitoring, security information management, threat monitoring, treat hunting and team management and comprehensive experience in End-to-End IT management, Solution Designing, Modern Workplace, DaaS, SaaS, IaaS, O365 and Cloud Migrations

Experience in Security Operations Centre as Information Security Analyst, Senior Security Analyst, and Team Lead from June 2015 – till date.

Advance Cyber breach investigation/Analysis/Remediation (Botnet, CnC, Ransomware, and Phishing attacks).

Deep logs investigation and analysis using security device such as Intrusion Detection & Prevention (IDS / IPS), Trend Micro APT and Symantec Endpoint Protection.

Good understanding of network fundamentals and protocols like TCP/IP, UDP, DHCP, FTP, DNS, SMTP, SSH, SSL, HTTP and HTTPS.

Handling the team for providing proper support to other Analysts in BAU.

Regular interaction with the associated customer to update regarding security issues being noted in their infrastructure and provide them daily, weekly, and monthly Reports.

Taking part for preparing proper documents like Playbooks, Client DL /asset list, SOPs, and other standard operational documents.

Knowledge of Malware analysis, Vulnerability assessment and BCP/DR.

Knowledge on Physical security in information security.

Worked on Qualys VA and Forcepoint DLP tool POC.

Worked on Carbon Black EDR solution and Tanium endpoint security solution.

Having working experience on Project management and team management.

Having working experience on Microsoft products like : MDE, MDI, MDO and O365

Basic working experience and acquiring knowledge on Mergers & Acquisitions.

Strong ability to handle multiple cross functional teams and prioritize multiple tasks to develop and deliver cost and time-effective business solutions.

Having working experience on Project management and team management.

Having working experience on Microsoft products like : MDE, MDI, MDO and O365

Basic working experience and acquiring knowledge on Mergers & Acquisitions.

Expertise and defect Management Process, (AECM) Adverse Events and Complaint Management (Identifying, analyzing, reproducing, and fixing of bugs)

Good Experience in training and onboarding of new members in team. Acted as Onsite Coordinator and delegating the projects to the offshore

Proficient in preparing documentation, Support notes for the Application Support.

Excellent problem-solving skills with a strong technical background and good interpersonal skills.

SCCM 2007 & 2012 CAS Primary and secondary site Installation.

Expert knowledge on Microsoft Debugging Tools (SYS Internals), Fiddler, MS Office & Windows Registries.

Recognized for delivering leading edge solutions that consistently meet complex business requirements.

An out of the box thinker with proven track record of establishing processes, SOP’s, streamlining workflow and creating team work environment to enhance productivity.

Have good knowledge on Network Administration, Linux OS, Layers, OSI model and TCP/IP model.

TRAININGS & CERTIFICATIONS:

Scrum master

Certified Azure Administrator

Certified in Microsoft 365 Certified: Endpoint Administrator Associate

Trained in Microsoft 365 Certified: Endpoint Administrator Associate

Attended training on Azure Security Associate AZ-500, preparing for Certification

Attended Qualys Cloud Security Assessment Training.

Completed training on MS products like MDO, MDE and MDI

Trained on Verizon NDR (Protect wise) product.

Trained on Trend Micro Cloud One Deep Security tool

Windows Server 2008 Active Directory Configuration (MCTS)

Trained in Cisco Certified Network Administrator (CCNA)

Trained in Software Center Configuration Manager (SCCM) & Microsoft INTUNE

Salesforce Certified Administrator

TECHNICAL SKILLS

SIEM Tool/Analytics : SIEM- ArcSight ESM/Logger, QRadar, DNIF, Alien Vault, ELA, EIQ, Splunk,

Wireshark(basic), Nessus, Nmap

Technologies: SCCM, Scrum master, Intune, Azure AD, Ivanti, PowerShell,

CyberArk, IBM MAAS360, MS SQL, Tanium, Salesforce Administrator.

Mobile Device Management (MDM), Modern Workplace Solutions

Cloud Technologies : Microsoft Azure, AWS Cloud Platform, VM Ware one, Microsoft Hyper-v &O365 Debugging Tools : Microsoft WinDbg, ProcMon, ProcDump, Process Explorer, Apple Diagnostics.

Reporting/CRM Tools : ServiceNow, BMC Remedy & Salesforce, ITSM, OTRS.

Project Management Tools : GitHub & ServiceNow Dashboards, MS Project, Rally, Jira

Business process : Project Management, Data security and compliance

Methodologies : Waterfall, Agile (SAFe, Scrum), Hybrid, Kanban

Project Management Tools : GitHub & ServiceNow Dashboards, MS Project

Platforms : Windows 7/8/10, Linux (RedHat, Ubuntu, Kali).

Networking : TCP/IP, OSI, VPN, Various Protocols.

Programming : C, MySQL, HTML/CSS

Other Skills : Malware Analysis and Vulnerability Management, Basics of Cloud Security,

Knowledge on Red Team activities.

Web Services : EC2, EBS, IAM, S3 and Lambda function

PROFESSIONAL EXPERIENCE

Client: Mercedes-benz, USA. Feb 2022 to Aug 2023

Role: Security consultant

Responsibilities

Advance Cyber breach investigation/Analysis/Remediation (Botnet, CnC, Ransomware, and Phishing attacks).

Deep logs investigation and analysis using security device such as Intrusion Detection & Prevention (IDS / IPS), Trend Micro APT and Symantec Endpoint Protection.

Good understanding of network fundamentals and protocols like TCP/IP, UDP, DHCP, FTP, DNS, SMTP, SSH, SSL, HTTP and HTTPS.

Handling the team for providing proper support to other Analysts in BAU.

Collaborated with other engineering teams to understand their systems and help improve them.

Developed Internal and customer facing cloud services (Server less and container-based) in AWS using AWS ECS

Rotated IAM access keys regularly and standardized on a selected number of days for password expiration to ensure that data cannot be accessed with a potential lost or stolen keys

Restricted access to RDS instances to decrease the risk of malicious activities such as bruteforce attacks, DOS or SQL injection.

Inventoried and categorized all existing AWS resources.

Monitored and analyzed cloud security events and logs and identifying, responding to security incidents in real-time, resulting in a 50% reduction in potential security risks.

Solutions Architect for Mercedes-Benz & Daimler Trucks Client – Managing more than 3.5Lakh end points.

Responsible for managing Infrastructure Operations and Delivery which includes Providing Technical Consultation, Solution Implementation and Expert support.

Modern Work Place Expert worked on Modern Device Management & Hybrid Workplace Flexibility.

Responsible for Simplified End-of-Life Management, Scalability and Agility, Technology Refresh and Expert Support.

Lead large teams across different locations (EUC, IaaS, DaaS, SaaS, Collab, CyberArk, VDI, Printing, SCCM, Exchange, SPO, Office 365).

Worked closely with other Infrastructure teams and successfully designed and implemented Security Polices for DaaS such as: IAM, PIM, DLP, Azure Firewall, NSG’s, EDR and Azure Monitor.

Taking ownership of critical incidents, coordinating with resolution parties, and establishing effective communication between stakeholders for post-incident reviews

Project Planning, Implementation & Execution, Service Improvements & Automations. Working closely with Technical Leads and Architects across all Daimler locations - to design process and maintain set Service Level Agreements for smooth operations.

Reviewing and Fine-tuning optimization of services, Accountability for service delivery performance, meeting customer expectations and driving future demand.

Practicing ITIL Process and Managing In-house Infrastructure, which includes IT Hardware and End Clients, Operating Systems, Software Procurements and technical assistance.

Communicate maintenance schedules, operational issues and impacts to IT management.

Strong focus on service excellence and ownership for resolving customer issues.

Working with global colleagues to provide globally consistent processes and procedures.

Responsible for managing team budgets, keep a track and forecast the requirements accordingly.

Manage the support group to ensure ticket resolutions met with set SLA’s.

Regular interaction with the associated customer to update regarding security issues being noted in their infrastructure and provide them daily, weekly, and monthly Reports.

Taking part for preparing proper documents like Playbooks, Client DL /asset list, SOPs, and other standard operational documents.

Knowledge of Malware analysis, Vulnerability assessment and BCP/DR.

Knowledge on Physical security in information security.

Worked on Qualys VA and Forcepoint DLP tool POC.

Worked on Carbon Black EDR solution and Tanium endpoint security solution.

Having working experience on Project management and team management.

Having working experience on Microsoft products like : MDE, MDI, MDO and O365

Plan and deploy Enclave Boundary Defence systems and programs including firewall, proxy server and other devices and applications to all DTRA enclaves.

Plan and deploy De-Militarized Zones (DMZs) for each DTRA NTS managed firewall

Verify devices are configured in accordance with DISA Security Technical Implementation Guides (STIGs)

Basic working experience and acquiring knowledge on Mergers & Acquisitions.

Deep investigation on critical alerts from SIEM for proactive prevention of threats Monitoring, analyzing and alerting real time incidents

Monitoring, analyzing logs from various security appliances using Sentinel console.

Strategic technical lead who will oversee the vision, roadmap, trade-offs and delivery across the enterprise with a relentless focus on balancing security with simplification.

Serve as a cyber security counsel to senior leadership

Operate as a trusted advisor on cyber security as well as for a specific technology, platform and/or capability domain, helping to shape use cases and implementation in an unified and consistent manner

Brings in a larger context to a larger software teams and architects across multiple domains/departments and guide their architecture evolution in response to business changes

Builds awareness, increase knowledge and drive adoption of modern technologies, sharing consumer and engineering benefits to gain buy-in experience in cloud security

Support day-to-day cybersecurity threat detection and incident response operations through indicator pivoting, campaign analysis, and tactical intelligence

Identify and enhance processes where automation has the potential to improve efficiencies, provide actionable data, and facilitate collaboration across CSOC

Leverage Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) tools to identify threat patterns, enrich investigations, and build automation-supported workflows

Deconstruct multi-source reporting into actionable intelligence including Tactics, Techniques, and Procedures (TTPs) data objects, campaign analysis, and threat patterns.

Regularly analyze malware reports to track adversary behaviors and support the construction of a TTP repository

Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and Hunt teams.

Conduct time-sensitive analysis during cyber investigations, including active threat hunting, malware analysis, and campaign enrichment

Routinely identify gaps in detection and collaborate with teams across the Cyber organization to mitigate risk, including blocking of malicious indicators, tuning vendor signatures, and instrumenting custom detection rules

Support the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivoting

experience in cloud security

Worked on EDR, MCAS, MDATP.

Creating the Documents of incidents Response of various Incidents received

Prepared daily, weekly and monthly and ad-hoc reports.

Deep Analyzing the incidents through Microsoft EDR.

Monitoring, analyzing logs from various security appliances using LogRythm console.

Reporting device/interface down events to maintain maximum uptime and thus helping in preventing any log loss or minimizing any delay.

Analyzing and looking after proactive solutions of the spam emails

Creating the Documents of incidents Response of various Incidents received

Prepared daily, weekly and monthly and ad-hoc reports.

Modern Work Place Expert worked on Modern Device Management & Hybrid Workplace Flexibility.

Involved in SCCM Deployment process deployment.

Deploy mobile devices to employees and configure them according to company standards

Install and update device firmware, applications, and settings in MDM

Responsible for managing Infrastructure Operations and Delivery which includes Providing Technical Consultation, Solution Implementation and Expert support.

Project Planning, Implementation & Execution, Service Improvements & Automations. Working closely with Technical Leads and Architects across all Daimler locations - to design process and maintain set Service Level Agreements for smooth operations.

Responsible for configuring & managing App Protection Policy and Configuration Policy

Maintain an accurate inventory of all mobile devices within the organization.

Track and manage device assignments, replacements, and retirements

Handling the team for providing proper support to other Analysts in BAU.

Regular interaction with the associated customer to update regarding security issues being noted in their infrastructure and provide them daily, weekly, and monthly Reports.

Taking part for preparing proper documents like Playbooks, Client DL /asset list, SOPs, and other standard operational documents.

Modern management of Windows 10 using Windows Autopilot

Deep Analyzing the incidents through Redline and getting preliminary cause of an alert

Troubleshooting of Fire Eye communication issues on servers and Endpoint machines Creating Acquisitions of incident Triggered machines

Knowledge on AWS cloud platform

Knowledge sharing with team members

Client: Bei gene biotech, USA. Apr 2018 to FEB 2022

Role: Security Matter expert

Responsibilities

Monitoring, analyzing logs from various security appliances using Arc Sight ESM console, Arc Sight Logger and connectivity troubleshooting issues.

Created filters, active channels, queries in Arc Sight for monitoring purpose.

Tracking and reporting the configuration changes in routers, switches through dashboard.

Reporting device/interface down events to maintain maximum uptime and thus helping in preventing any log loss or minimizing any delay.

Monitoring Active Channels and Dashboards.

Plan and deploy De-Militarized Zones (DMZs) for each DTRA NTS managed firewall

Builds awareness, increase knowledge and drive adoption of modern technologies, sharing consumer and engineering benefits to gain buy-in experience in cloud security

Support day-to-day cybersecurity threat detection and incident response operations through indicator pivoting, campaign analysis, and tactical intelligence

Rotated IAM access keys regularly and standardized on a selected number of days for password expiration to ensure that data cannot be accessed with a potential lost or stolen keys

Restricted access to RDS instances to decrease the risk of malicious activities such as bruteforce attacks, DOS or SQL injection.

Inventoried and categorized all existing AWS resources.

Monitored and analyzed cloud security events and logs and identifying, responding to security incidents in real-time, resulting in a 50% reduction in potential security risks.

Identify and enhance processes where automation has the potential to improve efficiencies, provide actionable data, and facilitate collaboration across CSOC

Leverage Security Orchestration, Automation, and Response (SOAR) or Security Information and Event Management (SIEM) tools to identify threat patterns, enrich investigations, and build automation-supported workflows

Deconstruct multi-source reporting into actionable intelligence including Tactics, Techniques, and Procedures (TTPs) data objects, campaign analysis, and threat patterns.

Regularly analyze malware reports to track adversary behaviors and support the construction of a TTP repository

Proactively build and maintain relationships with partner teams, including but not limited to Cyber Intelligence, Red Team, Insider Threat, and Hunt teams.

Conduct time-sensitive analysis during cyber investigations, including active threat hunting, malware analysis, and campaign enrichment

Routinely identify gaps in detection and collaborate with teams across the Cyber organization to mitigate risk, including blocking of malicious indicators, tuning vendor signatures, and instrumenting custom detection rules

Support the tactical intelligence-to-detection pipeline, to include malware reverse engineering, TTP analysis, and association mapping in a TIP (threat intelligence platform) for future pivoting

Serve as a cyber security counsel to senior leadership

Operate as a trusted advisor on cyber security as well as for a specific technology, platform and/or capability domain, helping to shape use cases and implementation in an unified and consistent manner

Brings in a larger context to a larger software teams and architects across multiple domains/departments and guide their architecture evolution in response to business changes

Verify devices are configured in accordance with DISA Security Technical Implementation Guides (STIGs)

Product lifecycle management and upgrades to include installation of hotfixes, patches, and any other features to improve product performance

Maintain all current applicable firewall and proxy appliance policies to include DoD, DISA, and DTRA

Analyzing and looking after proactive solutions of the spam emails

Manage queries, reports, Filters, Connectors, and Active Channels in Arc Sight.

Creating the Documents of incidents Response of various Incidents received

Prepared daily, weekly and monthly and ad-hoc reports.

Responsible in Sending Weekly & Monthly reports on SLA’s and Metrics to Senior Management.

Implementing Performance Improvement Plans for team members and design Functional goals for every assessment year. Drive continual improvement initiatives by providing regular feedbacks.

Communicate maintenance schedules, operational issues and impacts to IT management.

Strong focus on service excellence and ownership for resolving customer issues.

Responsible for managing team budgets, keep a track and forecast the requirements accordingly.

Manage the support group to ensure ticket resolutions met with set SLA’s.

Responsible in Sending Weekly & Monthly reports on SLA’s and Metrics to Senior Management.

Implementing Performance Improvement Plans for team members and design Functional goals for every assessment year.

Developed Internal and customer facing cloud services (Server less and container-based) in AWS using AWS ECS

Drive continual improvement initiatives by providing regular feedbacks

Triage collection of infected machines and analyzed using (Redline) Tool.

Deep Analyzing the incidents through Redline and getting preliminary cause of an alert

Troubleshooting of Fire Eye communication issues on servers and Endpoint machines Creating Acquisitions of incident Triggered machines

Creation, mapping, troubleshooting the issues of Identity Access Management Tool (PIM)

Assigning and troubleshooting of 2 factor (RSA SECURE ID) authentication issues.

Working in Security Operation Center (24x7), monitoring of SOC events, detecting and preventing the Intrusion attempts.

Monitoring real-time events using SEIM tools like HP ArcSight, IBM Qradar.

Monitoring, analyzing and responding to infrastructure threats and vulnerabilities.

Ad hoc report for various event sources customized reports and scheduled reports as per requirements.

Collecting the logs of all the network devices and analyze the logs to find the suspicious activities.

Creating the tickets in ticketing tool Service Now.

Investigate the security logs, mitigation strategies and responsible for preparing generic security incident reports.

Responsible to preparing the root cause analysis reports based on the analysis.

Analyzing daily, weekly and monthly reports.

Creating case for the suspicious issue and forwarding it to Onsite SOC team for further investigation.

Responsible for applying security updates and patches on servers, desktops, and laptop

Involved in SCCM Deployment process deployment.

Responsible for managing Infrastructure Operations and Delivery which includes Providing Technical Consultation, Solution Implementation and Expert support.

Modern management of Windows 10 using Windows Autopilot

Responsible for configuring & managing App Protection Policy and Configuration Policy.

Real time troubleshooting related to SCCM issues.

Involved in SCCM patching process deployment.

Check health of device every week and sharing report of device in Intune

Creating the software update group.

Creating the individual search for Windows Updates.

Adding the security updates Windows Updates to update groups.

Downloading the software updates.

Deploying the security updates to UAT, PILOT & Production.

Client: Daimler, Bengaluru. Oct 2014 to Apr 2018

Role: System Administrator

Responsibilities

Escalation Lead for a Team of 6 Tier2 System Administrators for In-House IT Support.

Strong Knowledge on Windows Administration and Providing L3 level support.

Complete Asset Management handled seamlessly.

Installing server operating system windows Server (2003, 2008, 2012)

Installation and configuration SCCM Client & WMI remediation.

Sending project milestones and updating the client about the progress of the project regularly.

Managing the SCCM reports for patching and client’s status.

Performed remote installations and product fixes, as well as various troubleshooting support.

Providing Trainings to New Associates and Send Weekly, Daily Reports to the Management representing Infrastructure Teams.

Extensive Experience with troubleshooting Windows Installer (MSI) & Windows Installer Transforms (MST) installation and runtime errors.

Creating configuration items.

Creating configuration base lines.

Deploying baselines to respective collections.

Distribute the content to Distribution point and groups.

Deploying the application model and package model to device collections.

Deploying the application for self-service portal.

Creating package model for deployments.

Configuring Servers Roles - AD, DHCP, DNS, Exchange.

Configuration and Troubleshooting File Server, Print Server for Domain Access.

Installing and Managing Anti-Virus Software (Symantec, McAfee) for all Clients and servers

SCCM patch management: OS deployment through SCCM OSD and MDT.

Creation and configure packages, programs, advertisement and collections for Software Distribution.

Handling with Antivirus Server and server related queries with User Updates.

Creating Local Profiles to the local users for customizing desktop settings.

Testing Different Application Packages before Pilot Release on Windows 7 and Investigate the Application Connectivity from different Applications, Vendors and Partnered Networks.

Testing application model and package model in UAT and PILOT environment and rollout it in production.

Creating the individual search for Windows Updates.

Adding the security updates Windows Updates to update groups.

Downloading the software updates.

Deploying the security updates to UAT, PILOT & Production.

Documentation of every month patches.

Documentation of every month patches.

Preproduction testing of patches.

Troubleshooting and diagnosing the SCCM log files for patching related issues for users.

Knowledge of installation and configuration WSUS / Integrated SCCM Patch management.

Knowledge on 3rd party patching with SCUP.

Knowledge on integration of SCUP with WSUS and SCCM.

Migrations, Software Distribution & Local IT Support.

Collaborating with business to define solutions to meet business requirement and Infrastructure Governance.

Working closely with Program Manager to maintain and set Service Level Agreements and reduce escalations.

Communicate maintenance schedules, operational issues and impacts to IT management.

Strong focus on service excellence and ownership for resolving customer issues.

Responsible for Windows OS Migrations from Win7 to 10 (targeted to 20 thousand end clients).

Automated few tasks on Windows10 OS, which includes folder redirection, home drive synchronization.

Subject Matter Expert for WinServer2012, 2016 & Windows7, 8.1 and 10 Client Operating Systems.

Working with global colleagues to provide globally consistent processes and procedures.

Responsible for managing team budgets, keep a track and forecast the requirements accordingly.

Manage the support group to ensure ticket resolutions met with set SLA’s.

Hands-on Experience in Managing enterprise environment using various virtualizations

Streamlined the processes and working closely with leaders of various other CoE's.

Creating the Task sequence according to the requirement.

Targeting the task sequence to the collections.

Customizing SQL queries, reports as per requirements.

Having knowledge on creating custom reports by report builder.

Creating datasets for drop down options in reports.

Having knowledge on how to creating query-based collection by using power shell

Initiate hardware and software inventory by using power shell on remote machines.

Responsible in Sending Weekly & Monthly reports on SLA’s and Metrics to Senior Management.

Implementing Performance Improvement Plans for team members and design Functional goals for every assessment year. Drive continual improvement initiatives by providing regular feedbacks.

Actively participating in Innovation and Automation

Having knowledge on modifying MOF files to extend Hardware inventory.

Installation of various software and applications according to company policies

Installing and troubleshooting hardware and software issues.

EDUCATION

B. Tech (ECE) from Jawaharlal Nehru Technological University Kakinada with First Class degree in 2010

M.Tech (Information security and cyber forensics) S.R.M University Chennai with First Class degree in 2013



Contact this candidate