Post Job Free

Resume

Sign in

Cyber Security Information

Location:
Chennai, Tamil Nadu, India
Salary:
8 Lakhs
Posted:
July 11, 2023

Contact this candidate

Resume:

R SAIRAM

Contact

Address:

Plot No * & *, Door No 9, Lakshmi Enclave,

Lakshmi Nagar 10th street, Nanganallur,

Chennai-600061.

Phone:

+91-735*******

+91-735*******

Email:

adx8ue@r.postjobfree.com

EDU - QUALIFICATIONS

• PG-DIPLOMA in Information Security

2019-2020

National Institute of Electronics and

Information Technology, Chennai (NIEIT)

• B.Tech in Computer Science

2015-2019

SRM University, Chennai.

CERTIFICATIONS

• CEH – Globally Certified as Ethical Hacker by

EC-Council

• Object Oriented Programming C, C++ - By

NIIT Chennai- Outstanding.

• Cyber Security Essentials – MSME - Govt of

INDIA.

• Cyber Security & Network Security with

Data Privacy – MSME – Govt of INDIA.

Summary

A Leading University graduate in computer science offering a strong academic background in IT combined with excellent experience as Information security Lead Engineer with exceptional record of competence and discretion

Adept at communicating with other engineers and clients in a clear and understandable manner. Able to maintain the highest standards of confidentiality in handling and protecting sensitive client information. EXPERIENCE

HCL TECHNOLOGIES, CHENNAI, INDIA

Designation - Info security Lead Engineer

From Feb 2021 to Till Date.

Deployed as Cyber Security and VA Engineer for IMSI staffing at HCL Technologies.

CORE SKILLS

• Superior breadth of experience in network administration and information security

• High skills in data analysis and network security threat identification

• Strong expertise in detecting intrusions via network scans.

• Excellent proficiency with encryption firewalls authorization methodologies and Web filtering authentication

• Exceptional skills in critical issue identification and resolution

• Profound facility with security policy development implementation and enforcement

• Outstanding skills in conveying complex technical information clearly and accessibly.

• Consistently recognized for technical troubleshooting skills used to rapidly and cost effectively resolve challenging technical issues.

• Quickly learn and master new technology.

• Triage malware incidents, review their priority and the need for escalation.

• Investigate incidents using SIEM technology, packet captures, reports, data visualization, and pattern analysis.

• Identify and document containment and remediation efforts which successfully reduce risk.

• Develop and maintain disaster recovery plans to ensure business continuity in the event of a security breach or natural disaster

Key Skill & Proficiencies

Access Management - Compliance

Firewalls - Information Security

Network Security - PCI Compliance

Project Management - Python

Risk Management - Root Cause Analysis

Security Controls - SIEM

SOC ANALYST

TCP IP - Top Secret Clearance

User Authentication - Vulnerability

Assessment

ISO 27001 - Fully Exposure in

Information security

policies and Techno-

logies as per ISMS.

LANGUAGES

Speak Read Write

TAMIL

ENGLISH

HINDI

PERSONALITY TRAITS

• Spontaneous

• Dynamic

• Versatile and Quick-Learner

HOBBIES

• Writing

• Sketching

• Photography

• Equally successful in both team and self-directed settings and proficient in a range of computer systems, languages, tools and testing methodologies.

• Good knowledge with scripting languages (Python). Good understanding of basic security concepts - authentication, authorization, auditing.

• Excellent verbal and written communication skills along with strong technical skills and client facing skills.

• Technical knowledge of VAPT and Pen testing skills. Thorough understanding of current Security principles, techniques and protocol. In-depth knowledge of risk assessment methods and technologies.

• Excellent verbal and written communication skills along with strong technical skills and client facing skills.

• Ability to keep current with new/cutting edge technologies, languages, tools and exploits and verbally technical concepts to a variety of technical and non-technical audiences.

• Establish and Maintain good working relationships between threat hunting, intelligence, and incident management team members to actually reduce risk.

• Identify mitigations and attacker paths by documenting preconditions for each attacker action.

• Conduct vulnerability assessments and penetration testing to identify security risks

• SOC ANALYST – Company’s cyber security and security operations. Identify, analyze and resolve the issue related to security.

TRAINING ATTENDED

• ETHICAL HACKER Completed Ethical Hacking course - Alison CYBER SECURITY ESSENTIALS Trained on Basic attacks in sniffing, spoofing and also other passive attacks.

• MACHINE LEARNING - Completed machine learning course from TCS.

• Cyber Inplant Training - Trained on different kind of protocols in networking and basics of networking in BSNL Projects.

• Project completed in PG-Diploma Jan 2020 Containerized Virtual OSSEC-WAZUH HIDS Using DOCKER.

• Monitoring files and folders with the help of OSSEC-WAZUH in DOCKER Project completed in final year June 2019

“Indoor/Outdoor Scene classification

• Classification of images into different environments of indoor and outdoor scenes with the help of transfer learning

• Worked on assessing and mapping in NIIST functions of various ISO standards like 27001,31000,27040 and others with respect to cyber security and cloud migration at HCL TECHNOLOGIES.



Contact this candidate