Post Job Free
Sign in

Incident Response Cybersecurity Analyst

Location:
Oklahoma City, OK
Posted:
March 21, 2025

Contact this candidate

Resume:

Naga Tadepu

Cybersecurity Analyst

+1-405-***-****

**********@*****.***

Professional Summary:

Cybersecurity professional with 4 years of experience in security operations, incident response, threat intelligence, and vulnerability management across enterprise environments.

Experienced in monitoring and analyzing security events using various SIEM platforms to detect and mitigate cyber threats.

Skilled in conducting vulnerability assessments and managing remediation processes to enhance security posture.

Hands-on experience in firewall management, configuring and optimizing security policies to protect network infrastructure.

Proficient in endpoint security, intrusion detection and prevention, and data loss prevention solutions to safeguard sensitive information.

Knowledgeable in cloud security monitoring, ensuring proactive identification and response to cloud-based risks.

Strong scripting skills for automating security tasks, log analysis, and streamlining incident response workflows.

Experienced in network monitoring and security analysis, identifying threats and ensuring compliance with security best practices.

Familiar with governance, risk management, and compliance frameworks, conducting assessments to align with industry standards.

Adept at collaborating with cross-functional teams, utilizing ticketing tools to manage incidents and ensure timely resolution.

TECHNICAL SKILLS:

SIEM platforms

Splunk, IBM QRadar, Netwitness

Vulnerability Management

Rapid-7 Nexpose, InsightVM, Qualys, Tenable Nessus

Security Tools

McAfee IPS, IPS/IDS, Burp Suite

Firewall Management

Palo Alto Networks, Checkpoint, Fortinet WAF

Email Security

Knowbe4, Phisher

Platforms/Applications

Web Application Scanning, Threat Protect, Policy Compliance,

Asset Management, Governance, Risk Management, and Compliance, NMAP, Veracode

Programming Languages

Python, PowerShell

Ticketing Tools

Service Now, Jira, BMC Helix (Remedy)

Network Monitoring

Wireshark, SolarWinds, Nagios

Cloud Security

AWS Security Hub, Azure Sentinel

Technical Expertise

Information Security, Incident Response, Security Operations Center,

SIEM, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Digital Forensic, DLP, IDS/IPS, Firewall, OSINT, OSI Model, OWASP top 10

DLP

Symantec DLP

Work Experience:

Client: Cisco May 2022 – Present

Location: Florida, USA

Role: Cybersecurity Analyst

Responsibilities:

Monitored and analyzed real-time security events using Splunk to identify and address potential threats efficiently.

Performed regular vulnerability assessments with Rapid7 Nexpose, remediating critical security weaknesses.

Deployed and managed McAfee Endpoint Security, enhancing endpoint protection and securing sensitive data.

Configured and optimized Palo Alto Networks firewalls to enforce robust security policies and prevent unauthorized access.

Conducted penetration testing with Metasploit to identify and exploit vulnerabilities across network and application layers.

Automated log analysis, vulnerability remediation, and threat intelligence tasks by developing custom Python scripts.

Utilized ServiceNow for efficient documentation, tracking, and resolution of security incidents and service requests.

Analyzed network traffic using Wireshark to diagnose issues and detect anomalous or suspicious activity.

Administered Linux servers, implementing system hardening measures and ensuring compliance with security policies.

Leveraged AWS Security Hub to monitor and improve the security posture of cloud infrastructure, adhering to best practices.

Implemented Data Loss Prevention (DLP) measures using McAfee tools to protect sensitive data from unauthorized access.

Delivered security awareness training to employees, minimizing phishing risks and fostering a culture of cybersecurity vigilance.

Led incident response efforts, including forensic investigations, root cause analysis, and corrective action implementation.

Collaborated with DevOps teams to integrate security best practices into CI/CD pipelines, reducing application vulnerabilities.

Evaluated and adopted emerging security technologies to strengthen defenses against evolving threats.

Conducted risk assessments and provided actionable recommendations to mitigate vulnerabilities and reduce organizational risks.

I participated in incident response tabletop exercises, enhancing preparedness and response effectiveness.

Reviewed and optimized firewall policies to reinforce network perimeter defenses against potential threats.

Analyzed multi-source security logs, delivering detailed incident trend reports and actionable insights to stakeholders.

Client: Infosys December 2019 – June 2021

Location: India

Role: Security Analyst

Responsibilities:

Leveraged IBM QRadar to monitor and respond to security events, ensuring rapid identification and mitigation of threats.

Performed detailed vulnerability assessments with Qualys to identify and remediate system and network weaknesses effectively.

Deployed and managed CrowdStrike Endpoint Protection to protect systems against malware and advanced persistent threats.

Configured and maintained Fortinet firewalls, implementing advanced security policies to enhance network defenses.

Conducted web application penetration testing using Burp Suite, uncovering vulnerabilities and providing mitigation strategies.

Automated repetitive security tasks, such as log analysis and user account audits, through PowerShell scripting.

Utilized Jira to document, prioritize, and track incidents and security-related projects efficiently.

Monitored network activity with SolarWinds to detect anomalies and ensure optimal system performance.

Secured Linux environments by applying hardening practices and conducting regular compliance audits.

Investigated and resolved cloud security alerts in Azure Sentinel, ensuring adherence to security standards and policies.

Collaborated with engineering teams to optimize IBM QRadar for improved threat detection and response.

Proactively identified risks during Qualys vulnerability scans and led efforts to implement effective remediations.

Enhanced remote access security by designing and managing Fortinet VPN solutions to balance flexibility and protection.

Generated detailed penetration test reports using Burp Suite findings, delivering actionable insights to developers.

Improved compliance and system maintenance by streamlining tasks through custom PowerShell scripts.

Authored thorough post-incident analyses and resolutions in Jira, fostering knowledge sharing and process refinement.

Optimized SolarWinds configurations to enhance network monitoring and accelerate anomaly detection.

Strengthened threat management processes by investigating cloud security incidents with Azure Sentinel and driving rapid resolutions.

Education:

I finished my master’s degree in engineering at the Oklahoma Christian University, spanning from August 2021 to April 2023.

Linked In: linkedin.com/in/naga-t-2a75822a5

CERTIFICATION:

CompTIA Security+

Introduction to Splunk

Foundational level Threat intelligence Analyst, Certificate

Python for everybody- Certificate1, Certificate2, Certificate3, Certificate4, Certificate5



Contact this candidate