Post Job Free
Sign in

Security Analyst Information

Location:
Leander, TX
Posted:
August 21, 2024

Contact this candidate

Resume:

VISHWAJA C

Austin, TX M: +1-407-***-**** ****************@*****.***

SUMMARY

As a recent graduate with a Master's degree in Cyber/Electronic Operations and Warfare, I have honed my skills through specialized courses. These include Strategic Operations, Encryption Methods, Threat Detection, Communications, Infrastructure Security, Intelligence/Counterintelligence, Law and Policy in Cybersecurity, Forensics, and Cloud Computing. My comprehensive education equips me to strategically apply technology in ensuring proficiency in key areas such as secure communication, threat identification, and adherence to legal and policy frameworks in cyber operations.

EDUCATION

WEBSTER UNIVERSITY Orlando, FL

Master of Science in Cyber/ Electronic Operations and Warfare - Threat Detection May 2023

Cumulative GPA: 3.75/4.0

VAAGDEVI ENGINEERING COLLEGE Telangana, INDIA

Bachelor of Technology- Major in Computer Science and Engineering May 2020

Cumulative GPA: 6.57/10

EXPERIENCE

Service Oriented Solutions LLC Newark, CA

Information Security Analyst Oct 2023 –Present

As an Information Security Analyst, I evaluate the existing network setup, identify security gaps, and implement solutions to protect the business from cyber threats and engage with Service-Oriented Architecture (SOA) that are applicable to cybersecurity since safeguarding APIs is a vital component in safeguarding an organization's data and services.

DAST (Dynamic Application Security Testing): Performed Vulnerability Assessment for web applications, API and Network. Validating the target for all the vulnerabilities like XSS, SQL Injection etc.

Monitored and analyzed security events using SIEM tools like IBM Q Radar to detect and respond to security incidents promptly. Having good knowledge of SOAR.

Experience with security monitoring tools, such as Microsoft defender for endpoint, proof point for email gateway.

Supported the management of Endpoint Detection and Response (EDR) systems, contributing to incident detection and analysis efforts.

Gained foundational knowledge in digital forensic investigations and eDiscovery tools through hands-on training and coursework.

Developed and documented security policies and procedures in collaboration with senior team members, ensuring compliance with industry standards and regulatory requirements.

WEBSTER UNIVERSITY Orlando, FL

Graduate Research Project Oct 2022 –Dec 2022

This project focuses on counterintelligence activities categorized into defensive, offensive, and collective efforts. Defensive measures aim to protect information, while offensive operations seek to turn threats into opportunities using deception. The use of decoys, like honeypots, is highlighted for defensive purposes.

Developing a theoretical framework for Cybersecurity Counterintelligence (CCI), emphasizing its academic and practical significance.

Evaluating real-world case studies involving successful CCI and zero-trust strategy integration for cybersecurity enhancement.

Creating a practical organizational template for implementing CCI and zero-trust strategies, addressing both idealized scenarios and practical challenges.

Served as a system administrator for security tools and applications, managing and configuring security systems to protect against cyber threats and ensure system integrity.

Conducted advanced penetration tests and vulnerability assessments, identifying and mitigating complex security risks under the guidance of experienced professionals.

AMAZON Development Centre Pvt Ltd Bangalore, INDIA

Process Associate CMT Ops Nov 2020 – Jul 2021

As a member of Amazon's Competitor Monitoring Team (CMT) in India, I lead global pricing for millions of items, ensuring competitiveness. Additionally, my role encompasses supporting fulfillment operations, conducting audits, and driving continuous process enhancements for efficient production and customer satisfaction.

Integrated geographic data with other types of data, such as demographic or economic data, to support various projects and analyses.

Monitored network traffic and assisted in the identification of suspicious activities, contributing to the maintenance of a secure network environment.

Generated reports and presentations to communicate mapping findings and results to stakeholders.

Identified and corrected errors or inconsistencies in mapping data.

ADDITIONAL

Technical Skills: Compliance (ISO 27001, NIST, PCI-DSS, GDPR), Network Security, Security Information and Event Management (SIEM), Intrusion Detection and Prevention, Threat Intelligence, Vulnerability Assessment, Firewall Administration, Risk Assessment, Security Policies and Procedures, Security Auditing and Compliance, Penetration Testing.

Tools:

Vulnerability Scanners (DAST): Nessus, Burp suite, OWASP ZAP

Network Scanning and Monitoring: Nmap, Wire shark, Snort, Nessus, Nikto

Penetration Testing Tools: Metasploit, MSF venom, OSINT

SIEM Tools: IBM Q Radar, Splunk

Operating System: Windows family, kali Linux

Web Technologies: HTML5, Javascript, CSS

Defect/Test Tracking tools: Jira

Certifications & Training: CISCO- Introduction to Cybersecurity • CISCO- Cyber Threat Management • CYBRARY- Network Fundamentals • CYBRARY- Introduction to IT & Cybersecurity, SERVICENOW-Micro Certifications.



Contact this candidate