VENKATESWARA RAO
VELPULA
SKILLS
• RHEL, CENTOS, UBUNTU, REDHAT
• HPOV
• Service now, Jira, Nagios, Grafana
• AWSCloudwatch
• Ansible, Bash, Python
• Satellite
• Jenkins
• Docker
• FortiGATE
• IDS/IPS
• Qualys
• Nessus
• SentinelOne
• Crowd Strike
• LogRhythm
• IBM QRadar
• Palo Alto
• Splunk Phantom
• Proofpoint
• Forcepoint
• AWS, Azure, GCP, OCI
• ISO27001
• HIPAA
• Penetration testing
Around 10+ years of experience in the IT sector in Linux, Cloud, and Cyber Security Industry for SOC environment using SIEM tools, EDR,XDR,VM,GRC, NGFW, and Email Security.
•
Professional IT specialist prepared for role with strong foundation in Linux systems and infrastructure management. Proven ability to streamline processes and enhance system performance through effective problem-solving and innovation. Highly collaborative, results-driven, and adaptable to changing technological needs, with expertise in scripting and network security.
•
Linux professional with focus on system stability, security, and performance optimization. Strong background in managing and troubleshooting complex Linux environments, ensuring seamless operation and minimal downtime. Adept at collaborating with cross- functional teams, adapting to evolving needs, and delivering reliable results. Proficient in shell scripting, network configuration, and system automation.
•
Professional in cybersecurity with deep expertise in threat analysis, risk management, and incident response. Excel in team collaboration, always adaptable to evolving challenges, ensuring robust security measures. Skilled in network protection, vulnerability assessment, and compliance with industry regulations. Known for reliability and achieving impactful results in dynamic environments.
•
Cybersecurity professional with robust history of safeguarding critical systems and networks. Proven track record of leading teams to identify vulnerabilities and implement effective security solutions. Known for collaborative spirit and adaptability in dynamic environments. Proficient in risk assessment, threat mitigation, and ensuring regulatory compliance.
•
Experienced with network security protocols, intrusion detection, and threat intelligence. Utilizes advanced methodologies to anticipate and counteract cybersecurity threats. Track record of efficiently managing incident response and maintaining robust security postures.
•
Knowledgeable with robust background in Linux systems engineering. Skilled in troubleshooting, system optimization, and infrastructure management with history of implementing effective solutions. Demonstrated proficiency in scripting and automation, ensuring seamless operations and enhanced security.
•
Experienced with Linux system administration, network configuration, and infrastructure management. Utilizes scripting and automation to streamline processes and enhance operational efficiency. Strong understanding of security protocols and system optimization to ensure reliable and secure environments.
•
WORK HISTORY
CONTACT
Dallas, TX 75001
**************@*****.***
EDUCATION
January 2011
M.C.A
Osmania University, India
January 2008
B.Sc.
Kakatiya University, India
CERTIFICATIONS
Certified Ethical Hacker v12 (CEH),
11/12/14
•
Microsoft Certified: DevOps Engineer
Expert
•
Microsoft Certified: Azure
Administrator Associate
•
AWS Certified Solutions Architect –
Associate
•
HashiCorp Certified: Terraform
Associate (003)
•
RHCSA Rapid Track Course Red Hat
Enterprise Linux 6, 11/12/14 - 11/15/14
•
Red Hat System Administration III
Red Hat Enterprise Linux 6, 01/14/15 -
01/17/15
•
August 2024 - Current
Senior Security & Linux Engineer Salient Global Technology, Dallas, Tx Working on the IBM Q RADAR and Log Rhythm, (console & web console) providing operations support at the Security Operations Centre for different firms.
•
Troubleshooting SIEM dashboard issues when there are no reports getting generated or no data available.
•
Managed and resolved high-priority L3 (Level 3) tickets in an ITSM environment, ensuring timely resolution aligned with SLAs.
•
Conduct Vulnerability assessments of Network and Security devices using various tools like NMAP and Burp Suit.
•
Map out a network, discover ports and services running on the different exposed network and security devices.
•
Handling the complete incident management framework cycle right from incident identification, incident containment, performing root cause analysis, suggestion and implementation of preventive and corrective controls and perform network analysis as needed on a case- to-case basis.
•
Analyzing Phishing and Spam related mails using header analysis, Body analysis using various tools and block them in O365.
•
• Preparing Weekly and Monthly reports.
Will document the tickets with all the action taken for the incident and update it on frequent basis and maintain ticket quality by documenting it with all the required information.
•
• Conducted and managed Vulnerability scans using Qualys tool.
• Identifying critical weaknesses across diverse IT environments. Collaborating with IT teams for patch management and ensures timely deployment of patches and reduce system vulnerabilities.
•
Generating detailed security reports and dashboards, summarizing findings for senior management and stakeholders
•
Worked with cross-functional teams to address complex issues, including software bugs, infrastructure failures, and security vulnerabilities
•
Ensured all firewalls, security devices, systems, databases and applications reported data to SIEM and resolved any reporting issues while performing regular health checks.
•
Block listing and whitelisting the Domains, Emails in Email security tool Proof point.
•
• Block listing the malicious IPs in Firewalls.
Providing USB access request for specific users for business requirement through the requests in the ITSM ticketing tool.
•
Purging the host name if any one leaves the organization in the sentinel one.
•
• Blocking the malicious Hash values in the EDR tool.
• Exposure to Ticketing tool Service Now.
Installation and Configuration SSH, FTP, TELNET AND NFS, DNS, DHCP & IPAM (DDI).
•
• Expertise on different file systems like ext3, ext4, XFS and NFS.
• Expertise in server troubleshooting and hardening.
• Coordinating with customers for change management. Installing & removing packages using RPM & YUM; contributing to kernel patching by using satellite server.
•
System Administration, maintenance and monitoring various day-to- day operations.
•
Adding route entries for accessing servers from different zones & executing system administration, maintaining & monitoring various day-to-day operations.
•
Performing patch upgradation and OS upgradation as per vendor or customer requirements & automating job for various tasks using CRON
•
May 2022 - July 2024
Senior Security & Linux Engineer Skill Mine Technologies, Hyderabad
& AT.
Securing the servers as per organization's policies & providing L1, L2 & L3 level support to the customer on all Linux server issues as per SLA.
•
Installing software, patching, upgrading, & maintaining operating system & implementing RHEL Pacemaker cluster setup.
•
Expertise in LINUX / UNIX system builds, administration, Installations, Upgrades, Troubleshooting on different distributions such as Ubuntu, CentOS, RHEL.
•
Worked as data center operator for configuring rack setup of physical server's induction (HP, Cisco, Lenovo, and Dell) and storage cable's connectivity of servers.
•
Resolving the hardware issues (DIMM, Hard disk) on data center for physical servers.
•
Expertise in user & group management, disk partitioning (LVM) and working experience in large-scale enterprise development environment.
•
Utilize tools like top, htop, iostat, and vmstat to monitor CPU, memory, disk I/O, and network usage.
•
Developed custom shell scripts for system monitoring and automation, improving response times to incidents.
•
Provided 24/7 support for critical production systems, reducing average incident resolution.
•
Spearheaded a migration project to RHEL 8, resulting in enhanced system security and performance.
•
Recognized for leading a team in a successful data center consolidation, reducing operational costs.
•
• Adjust kernel parameters using sysctl to optimize performance. Use tune2fs to adjust filesystem parameters, such as enabling journaling or optimizing block sizes based on application needs.
•
Implement RAID configurations (e.g., RAID 0, RAID 1, or RAID 10) to improve disk performance and redundancy
•
• Use ulimit to manage resource limits for users and processes.
• Analyze CPU, memory, and storage trends to forecast future needs. Identify thresholds for CPU, memory, and disk I/O before performance degradation occurs.
•
Maintain documentation of capacity planning processes and decisions for future reference.
•
Regularly report on system performance and capacity forecasts to stakeholders for informed decision-making.
•
Developed and conducted training programs for junior staff on RHEL best practices and troubleshooting techniques.
•
.Worked on the IBM Q RADAR and LogRhythm, (console & web console) providing operations support at the Security Operations Centre for different firms.
•
Troubleshooting SIEM dashboard issues when there are no reports getting generated or no data available.
•
Managed and resolved high-priority L3 (Level 3) tickets in an ITSM environment, ensuring timely resolution aligned with SLAs.
•
Conduct Vulnerability assessments of Network and Security devices using various tools.
•
Map out a network, discover ports and services running on the different exposed network and security devices.
•
Handling the complete incident management framework cycle right from incident identification, incident containment, performing root cause analysis, suggestion and implementation of preventive and corrective controls and perform network analysis as needed on a case- to-case basis.
•
May 2022 - July 2024
Senior Security & Linux Engineer Skill Mine Technologies, Hyderabad Conducted and managed Vulnerability scans using Qualys tool. Identifying critical weaknesses across diverse IT environments.
•
Collaborating with IT teams for patch management and ensures timely deployment of patches and reduce system vulnerabilities.
•
Generating detailed security reports and dashboards, summarizing findings for senior management and stakeholders.
•
Worked with cross-functional teams to address complex issues, including software bugs, infrastructure failures, and security vulnerabilities.
•
Ensured all firewalls, security devices, systems, databases and applications reported data to SIEM and resolved any reporting issues while performing regular health checks.
•
Blocklisting and whitelisting the Domains, Emails in Email security tool Proofpoint.
•
• Blocklisting the malicious IPs in Firewalls.
Blocking the malicious Hash values in the EDR tool. Exposure to Ticketing tool Service Now.
•
Installation and Configuration SSH, FTP, TELNET AND NFS, DNS, DHCP & IPAM (DDI).
•
• Expertise on different file systems like ext3, ext4, XFS and NFS.
• Expertise in server troubleshooting and hardening.
• Coordinating with customers for change management Installing & removing packages using RPM & YUM; contributing to kernel patching by using satellite server
•
System Administration, maintenance and monitoring various day-to- day operations.
•
Performing patch upgradation and OS upgradation as per vendor or customer requirements & automating job for various tasks using CRON
& AT.
•
Securing the servers as per organization's policies & providing L1, L2 & L3 level support to the customer on all Linux server issues as per SLA.
•
Installing software, patching, upgrading, & maintaining operating system & implementing RHEL Pacemaker cluster setup.
•
• Expertise in LINUX / UNIX system builds, administration, Installations. Worked as data center operator for configuring rack setup of physical server's induction (HP, Cisco, Lenovo, and Dell) and storage cable's connectivity of servers.
•
Resolving the hardware issues (DIMM, Hard disk) on data center for physical servers.
•
Expertise in user & group management, disk partitioning (LVM) and working experience in large-scale enterprise development environment.
•
Developed custom shell scripts for system monitoring and automation, improving response times to incidents.
•
• Adjust kernel parameters using sysctl to optimize performance. Use tune2fs to adjust filesystem parameters, such as enabling journaling or optimizing block sizes based on application needs.
•
Implement RAID configurations (e.g., RAID 0, RAID 1, or RAID 10) to improve disk performance and redundancy.
•
• Use ulimit to manage resource limits for users and processes. Collect historical performance data to identify usage patterns using tools like SAR or collectl.
•
• Analyze CPU, memory, and storage trends to forecast future needs. Maintain documentation of capacity planning processes and decisions for future reference.
•
Developed and conducted training programs for junior staff on RHEL best practices and troubleshooting techniques.
•
.Worked on the IBM Q RADAR and LogRhythm, (console & web console) providing operations support at the Security Operations Centre for different firms.
•
Troubleshooting SIEM dashboard issues when there are no reports getting generated or no data available.
•
Managed and resolved high-priority L3 (Level 3) tickets in an ITSM environment, ensuring timely resolution aligned with SLAs.
•
Conduct Vulnerability assessments of Network and Security devices using various tools.
•
Map out a network, discover ports and services running on the different exposed network and security devices.
•
Handling the complete incident management framework cycle right from incident identification, incident containment, performing root cause analysis, suggestion and implementation of preventive and corrective controls and perform network analysis as needed on a case- to-case basis.
•
Conducted and managed Vulnerability scans using Qualys tool. Identifying critical weaknesses across diverse IT environments.
•
Collaborating with IT teams for patch management and ensures timely deployment of patches and reduce system vulnerabilities.
•
Generating detailed security reports and dashboards, summarizing findings for senior management and stakeholders.
•
Worked with cross-functional teams to address complex issues, including software bugs, infrastructure failures, and security vulnerabilities.
•
Ensured all firewalls, security devices, systems, databases and applications reported data to SIEM and resolved any reporting issues while performing regular health checks.
•
Blocklisting and whitelisting the Domains, Emails in Email security tool Proofpoint.
•
• Blocklisting the malicious IPs in Firewalls.
Blocking the malicious Hash values in the EDR tool. Exposure to Ticketing tool Service Now.
•
Installation and Configuration SSH, FTP, TELNET AND NFS, DNS, DHCP & IPAM (DDI).
•
• Expertise on different file systems like ext3, ext4, XFS and NFS.
• Expertise in server troubleshooting and hardening.
• Coordinating with customers for change management Installing & removing packages using RPM & YUM; contributing to kernel patching by using satellite server
•
System Administration, maintenance and monitoring various day-to- day operations.
•
Performing patch upgradation and OS upgradation as per vendor or customer requirements & automating job for various tasks using CRON
& AT.
•
Securing the servers as per organization's policies & providing L1, L2 & L3 level support to the customer on all Linux server issues as per SLA.
•
Installing software, patching, upgrading, & maintaining operating system & implementing RHEL Pacemaker cluster setup.
•
• Expertise in LINUX / UNIX system builds, administration, Installations. Worked as data center operator for configuring rack setup of physical server's induction (HP, Cisco, Lenovo, and Dell) and storage cable's connectivity of servers.
•
Resolving the hardware issues (DIMM, Hard disk) on data center for physical servers.
•
Expertise in user & group management, disk partitioning (LVM) and working experience in large-scale enterprise development environment.
•
Developed custom shell scripts for system monitoring and automation, improving response times to incidents.
•
April 2020 - May 2022
Associate Manager 3i Infotech, Hyderabad
• Adjust kernel parameters using sysctl to optimize performance. Implement RAID configurations (e.g., RAID 0, RAID 1, or RAID 10) to improve disk performance and redundancy.
•
• Use ulimit to manage resource limits for users and processes.
• Analyze CPU, memory, and storage trends to forecast future needs. Maintain documentation of capacity planning processes and decisions for future reference.
•
Developed and conducted training programs for junior staff on RHEL best practices and troubleshooting techniques.
•
Associate in SOC operations for real-time monitoring, analysing logs from various security/Industrial appliances.
•
Administered various incidents/security alerts triggered in the SIEM tool.
•
Carrying out log monitoring and incident analysis for various devices such as Firewalls, IDS, IPS, databases, web servers, and so forth.
•
Security event analysis and intrusion detection by review and analysis of events generated by various components including IDS/IPS, firewalls, Routers, DB, and various types of security devices.
•
Performed Real-Time Monitoring, Investigation, Analysis, Reporting, and Escalations of Security Events from multiple log sources.
•
• Preparing RCA documents and daily/weekly/monthly Reports. Support security incident response processes in the event of a security breach by providing incident reporting.
•
Review software posture and work with operations to plan code version upgrade requirements of supported security and network devices.
•
Automating routine responses to security events to reducing the human intervention.
•
Responsible for managing all aspects of the Vulnerability Risk Management Program including vulnerability identification, analysis, remediation coordination and reporting.
•
Coordinate with Admin team to report vulnerabilities by explaining the exploitation and the impact of the issue.
•
• Managing permissions and access to the product.
• Performing authenticated and unauthenticated vulnerability scanning. Assisting teams with vulnerability resolution, including providing assistance researching vulnerabilities solutions and addressing false positives to reduce system workloads, performing confirmation scans when appropriate, meeting regularly with remediation team, and building reports to provide teams with necessary data.
•
Understanding the incident based on to determine whether it's false or true positive.
•
Expertise in LINUX / UNIX system builds, administration, Installations, Upgrades, Troubleshooting on different distributions such as Ubuntu, CentOS, RHEL.
•
Resolving the hardware issues (DIMM, Hard disk) on data center for physical servers.
•
In-depth knowledge on different file systems like ext3, ext4, XFS and NFS.
•
Installation and Configuration SSH, FTP, TELNET AND NFS, DNS, DHCP & IPAM (DDI).
•
Utilize tools like top, htop, iostat, and vmstat to monitor CPU, memory, disk I/O, and network usage.
•
Developed custom shell scripts for system monitoring and automation, improving response times to incidents.
•
Provided 24/7 support for critical production systems, reducing average incident resolution.
•
December 2017 - April 2020
Senior Software Engineer Wipro LTD, Hyderabad
February 2016 - December 2017
AWS & Linux Administrator Phenom People, Hyderabad Spearheaded a migration project to RHEL 8, resulting in enhanced system security and performance.
•
• Adjust kernel parameters using sysctl to optimize performance. Implement RAID configurations (e.g., RAID 0, RAID 1, or RAID 10) to improve disk performance and redundancy.
•
• Use ulimit to manage resource limits for users and processes. Collect historical performance data to identify usage patterns using tools like SAR.
•
• Analyze CPU, memory, and storage trends to forecast future needs. Identify thresholds for CPU, memory, and disk I/O before performance degradation occurs.
•
Enhanced network security by implementing advanced threat detection and prevention systems.
•
Collaborated with IT teams to integrate security measures into software development life cycles, ensuring secure product releases.
•
Fostered relationships with external partners including law enforcement, fellow industry professionals and intelligence communities to stay informed about latest trends, threats and advancements in the field of cybersecurity.
•
Strengthened risk management strategies by developing comprehensive risk assessments based on current threats facing the organization''s industry sector.
•
Conducted regular audits of security infrastructure, identifying weaknesses and recommending improvements.
•
Spearheaded the adoption of industry best practices, resulting in a more robust cybersecurity framework for the organization.
•
Served as a subject matter expert and resource for both technical and non-technical staff on issues related to cybersecurity best practices, incident response and data protection requirements.
•
Prevented costly data breaches by proactively addressing identified vulnerabilities within applications and networks before they could be exploited by malicious actors.
•
Managed vendor relationships to ensure adherence to organizational cybersecurity standards and policies.
•
Led cross-functional teams in establishing disaster recovery plans, minimizing potential data loss during critical incidents.
•
Improved incident response times with the development of comprehensive incident management plans and procedures.
•
Reduced cyber attack risks by conducting thorough vulnerability assessments and penetration testing.
•
Established a culture of shared responsibility for cyber hygiene within the organization through effective communication of policies, procedures and expectations around securing sensitive information.
•
Developed customized cybersecurity training programs to raise employee awareness and minimize human error risks.
•
Oversaw digital forensics investigations following security incidents, uncovering root causes and preventing future occurrences.
•
• Conducted security audits to identify vulnerabilities. Reduced cybersecurity risks by regularly conducting vulnerability assessments and penetration tests.
•
Developed customized training programs to educate staff on cybersecurity threats and prevention techniques.
•
June 2015 - January 2016
Linux Administrator IBM, Chennai
Conducted regular audits of existing security infrastructure, identifying areas for improvement and recommending solutions accordingly.
•
Led the migration of critical systems to the cloud while ensuring minimal disruption to business operations and maintaining high levels of security throughout the process.
•
Implemented advanced threat intelligence tools, significantly improving incident detection rates and overall system resilience against cyberattacks.
•
Established monitoring systems to proactively identify potential weaknesses in cloud infrastructure, enabling early detection of vulnerabilities or breaches.
•
Evaluated third-party vendors for compliance with organizational security standards and industry best practices.
•
Implemented continuous integration and delivery pipelines that incorporated automated security testing at each stage, helping catch vulnerabilities before they could be exploited in production environments.
•
Collaborated with cross-functional teams to develop comprehensive cloud security strategies and policies.
•
Developed risk assessment frameworks tailored specifically for evaluating proposed changes or additions to cloud infrastructure components.
•
Optimized resource allocation for cloud-based infrastructure through careful analysis of usage patterns, resulting in cost savings without sacrificing system performance or reliability.
•
Enhanced cloud security by implementing robust encryption protocols and access control measures.
•
Collaborated with legal and compliance departments to ensure cloud- based solutions adhered to relevant regulations, including GDPR and HIPAA requirements.
•
Maintained up-to-date knowledge of emerging threats and trends in cybersecurity, adjusting strategies as needed to ensure optimal protection.
•
Managed implementation of multi-factor authentication systems, bolstering access control measures across all platforms.
•
Installation and Configuration SSH, FTP, TELNET AND NFS, DNS, DHCP & IPAM (DDI).
•
• Expertise on different file systems like ext3, ext4, XFS and NFS.
• Expertise in server troubleshooting and hardening.
• Coordinating with customers for change management. Installing & removing packages using RPM & YUM; contributing to kernel patching by using satellite server.
•
System Administration, maintenance and monitoring various day-to- day operations.
•
Adding route entries for accessing servers from different zones & executing system administration, maintaining & monitoring various day-to-day operations.
•
Performing patch upgradation and OS upgradation as per vendor or customer requirements & automating job for various tasks using CRON
& AT.
•
Securing the servers as per organization's policies & providing L1, L2 & L3 level support to the customer on all Linux server issues as per SLA.
•
Installing software, patching, upgrading, & maintaining operating system & implementing RHEL Pacemaker cluster setup.
•
Expertise in LINUX / UNIX system builds, administration, Installations, Upgrades, Troubleshooting on different distributions such as Ubuntu,
•
CentOS, RHEL.
Resolving the hardware issues (DIMM, Hard disk) on data center for physical servers.
•
Expertise in user & group management, disk partitioning (LVM) and working experience in large-scale enterprise development environment.
•
Utilize tools like top, htop, iostat, and vmstat to monitor CPU, memory, disk I/O, and network usage.
•
Developed custom shell scripts for system monitoring and automation, improving response times to incidents.
•
Provided 24/7 support for critical production systems, reducing average incident resolution.
•
Spearheaded a migration project to RHEL 8, resulting in enhanced system security and performance
•
Recognized for leading a team in a successful data center consolidation, reducing operational costs.
•
Analyze output to identify bottlenecks, such as high CPU load or excessive swapping.
•
• Adjust kernel parameters using sysctl to optimize performance. Use tune2fs to adjust filesystem parameters, such as enabling journaling or optimizing block sizes based on application needs.
•
Implement RAID configurations (e.g., RAID 0, RAID 1, or RAID 10) to improve disk performance and redundancy.
•
• Use ulimit to manage resource limits for users and processes. Tune caching parameters for applications (e.g., database caching) to reduce disk I/O.
•
• Analyze CPU, memory, and storage trends to forecast future needs. Identify thresholds for CPU, memory, and disk I/O before performance degradation occurs.
•
Maintain documentation of capacity planning processes and decisions for future reference.
•
Regularly report on system performance and capacity forecasts to stakeholders for informed decision-making.
•
Developed and conducted training programs for junior staff on RHEL best practices and troubleshooting techniques.
•
Configure Private DNS Zone to resolve private FQDN of PaaS services with endpoint IP.
•
Create VNET and Subnet as per application tier (tier 2 and tier 3) such as Web Zone, APP Zone and DB Zone.
•
Managing SN Tickets based related to deployment, troubleshoot the issue, enabling the backup, costing for services (IaaS and PaaS).
•
Configure and enable backup as per backup policy and retention period
(daily, weekly, monthly and yearly) for VMs.
•
• Sharing cost estimates of IAAS and some PAAS component. Check connectivity traffic IN and OUT from subnet using NSG and UDR.
•
Check connectivity issue along with respective stake holder (Security FW team and On-prem FW team).
•
• Creating and managing Infra of cloud as per application architecture. Deployment of an Azure VM (Windows server and Linux server) using custom or golden hardens images or marketplaces.
•
• Monitoring Azure VM alerts using Metrics & Action Groups. Troubleshooting Azure VM issues with the help of Boot Diagnostics, Serial Console, Redeploy, Guest diagnostics.
•
Create an Azure Virtual network in Azure portal and Configure Virtual networks connectivity using VET peering.
•
Create and manage VM scale set and enable auto-scaling, spinning image reference using image definition of image server.
•
Configuration of Traffic manager, Load balancer and Application Gateway Load Balancer.
•
April 2014 - May 2015
Senior Associate HCL Info Systems, Hyderabad
Building & releasing Ec2 instances Amazon Linux & Oracle Linux, Redhat and Windows for POC, Development and Production environment; setting up & attaching & detaching storage volumes to OCM instances & EBS volumes to Ec2 instances.
•
Troubleshooting all network related issues, file system problems and server troubleshooting & hardening.
•
Launching & configuring OCM Cloud Servers & Amazon EC2 (AWS) Cloud Servers using AMI's (Linux/Ubuntu).
•
• configuring the servers for specified applications. Configuring & managing cloud watch alerts, S3 storage, security