SUMMARY
BANSARI PATEL Cyber Security Analyst
+1-437-***-**** ****************@*****.*** LinkedIn Cybersecurity Analyst with 3+ years of experience reviewing security alerts, responding to incidents, and documenting investigative findings. Focused on reducing alert fatigue, identifying patterns linked to misuse or threats, and maintaining accurate records for audit purposes. Regularly involved in compliance-related activities and supported resolution of time-sensitive alerts. Contributed to improving procedures based on prior incidents and helped streamline coordination between investigation and compliance teams. TECHNICAL SKILLS
Operating Systems: Windows, Linux (Ubuntu, Kali)
SIEM & Monitoring Tools: Microsoft Sentinel, Splunk, ELK Stack, Azure Monitor Security Tools & Platforms: Zeek, Snort, Suricata, Nessus, OpenVAS, VirusTotal, Microsoft Defender, Aurora EDR Forensics & Malware Analysis: Volatility, FTK Imager, Autopsy, Ghidra, x64dbg, Windows Sysinternals Suite Scripting & Automation: Python, PowerShell, Bash, GitHub Actions (CI/CD), Regex, Sigma Rules Query & Data Languages: KQL, SQL
Network & Protocols: TCP/IP, DNS, HTTP/S, SSH, VPN, RDP, SMB, ICMP, LDAP, IDS/IPS Security Frameworks: MITRE ATT&CK, NIST, ISO 27001, OWASP Top 10, Cyber Kill Chain, SOC 2, PCI-DSS Threat Detection & Incident Response: IOC detection, Log Analysis, SOAR Playbook Creation, Threat Hunting, Endpoint Monitoring Data Visualization & Reporting: Sentinel Workbooks, Splunk Dashboards, Compliance Reporting Version Control & Deployment: GitHub, Git, GitHub Actions, CI/CD for security tool pipelines PROFESSIONAL EXPERIENCE
State Street, Canada Jan 2025 – Present
Cyber Security Analyst
• Produced weekly and monthly T&O IT Risk Reports by extracting, validating, and analysing core, supplementary, and aggregate security metrics using Tableau dashboards, Excel, and pivot tables.
• Ensured high-quality reporting by performing self-review, RAG threshold validation, filter accuracy checks, metric name alignment, and consistency across multiple decks (Core, Supplementary, Aggregate).
• Created and updated slides for Server Vulnerability Management, including Critical/High Non-Compliant metrics, Server Hygiene, and open shares, applying deep-dive analysis to identify trends, root causes, and impacted legal entities.
• Wrote breached metric commentary by analyzing vulnerability and workstation compliance data, validating mismatched numbers, investigating anomalies, and incorporating SME context from meetings
• Developed and enhanced operational reporting templates, improving formatting standards, data accuracy, and the structure of executive-ready risk dashboards.
• Completed DLP ORC reports and monthly Legal Entity reporting by accurately filtering, extracting, and validating data while ensuring compliance with reporting standards.
• Presented the Server Vulnerability Management slide to stakeholders, explaining metrics, graphs, and trends to audiences unfamiliar with vulnerability concepts.
• Generated summary notes for cross-functional meetings, capturing key discussions, follow-up items, and insights to support continuous improvements in reporting
• Collaborated with Managers and Analysts to resolve data issues, understand dashboard logic, and enhance analysis quality.
• Applied regulatory and security frameworks, including NIST CSF, PCI-DSS, SOX, and SOC when evaluating IT control posture and reporting on risk exposure.
• Strengthened skills in executive reporting, risk storytelling, data integrity validation, Tableau analytics, Excel troubleshooting, and vulnerability analysis through handson weekly deliverables. Citius Technologies, India Aug 2020 – Dec 2022
Cyber Security Analyst
• Tuned alerts in ELK Stack and Splunk to lower investigation time by 80%, reducing average incident response duration from 12 hours to under 2 hours.
• Developed Python scripts to parse and monitor RDP, SMB, and DNS logs, detecting abnormal activity across over 500 workstations within the first deployment cycle.
• Deployed Snort and Suricata IDS rules that helped detect 23 brute-force and 11 lateral movement attempts across hybrid network infrastructure during peak threat periods.
• Performed forensic analysis using Volatility and FTK Imager on 9 compromised systems, identifying malware behavior and persistence techniques for internal threat intelligence.
• Updated SOAR playbooks based on observed incidents, reducing Tier-1 analyst escalations by 35% and allowing quicker resolution of low and medium severity alerts.
• Triaged 50+ weekly incidents involving phishing, malware, and VPN misuse using Microsoft Defender and VirusTotal, escalating critical cases within the defined SLA timelines.
• Wrote regex-based Splunk parsers to extract 12 key fields from noisy logs, improving detection fidelity and reducing unnecessary alerts by 35% during monthly tuning.
• Queried login failures using SQL and KQL, uncovering 8 brute-force attempts and 3 privilege escalations over internal VPN access in one quarter.
• Analyzed 5 malware samples using Ghidra and x64dbg, identifying obfuscation layers and generating 10+ YARA signatures for sandbox detection.
• Created ISO 27001 and NIST-aligned documentation for 20 closed incidents, supporting knowledge transfer and internal compliance efforts for future audits.
EDUCATION
Advanced Diploma Computer Security And Investigations April 2025 Fleming College - Canada
CERTIFICATION
• CompTIA Security+ Certification, Issued by CompTIA, 2024 Certified in Cybersecurity (CC), Issued by ISC2, 2023