Post Job Free
Sign in

Cyber Security Analyst with Threat Detection Expertise

Location:
Austin, TX
Posted:
May 12, 2026

Contact this candidate

Resume:

Rajvi Toraniya

Email: ****************@*****.*** +1-864-***-**** Objective

Motivated Cyber Security Analyst with hand-on experience in threat detection, vulnerability analysis, firewall administration, and security policy development. Strong technical foundation in risk management, incident response, and network security. Adept at leveraging tools like Wireshark, Kali Linux, and threat modeling frameworks to enhance enterprise security posture. Excellent communicator and team collaborator. Relevant Course work

Cyber Security, Information Security, Network Security, Web Security, Software Security Testing, Artificial Intelligence, Cloud Computing, Digital Technology, Programming, Data Structures, Computer Graphics Technical Skills

Security Technique:

- Security Principles: CIA Triad, Risk Management, Threat Intelligence

- Network Security: Secure Protocols, IDS/IPS, Firewalls, VPN

- Access Control: Identity and Access Management (IAM), MFA, Zero Trust

- Vulnerability Management: Patch Management, System Hardening, CVSS

- Incident Response: Detection, Response Planning, Recovery Strategies

- Security Tools: Wireshark, Nmap, Nessus, Splunk, QRadar

- Compliance & Governance: GDPR, HIPAA, NIST, ISO 27001

- CompTIA Security+ (SY0-701) Certified

Programming languages: Python, AngularJS, Node.JS, HTML, CSS, JavaScript, PHP, Android, IOS, C#, C, Basic Java, ASP.Net

Software: Microsoft Office, Visual Studio, Android Studio, Adobe Photoshop, NetBeans, Eclipse, GitHub, JQuery, Wireshark

Operating Systems: Windows, Mac OS, Linux (Kali Linux), Ubuntu Networking Basic: Router, Switches, LAN, MAN, WAN, VPN, Cloud Computing Soft Skills: Strong Communication, problem-solving and analytical skills, team collaboration Professional Experience

CompTIA Security+ (SY0-701) Certified June 2025

Cybersecurity professional with a strong foundation in information security principles, threat analysis, risk management, identity management, and network defense. Skilled in identifying vulnerabilities, implementing access controls, and responding to security incidents using industry standard tools and frameworks. Skilled in using tools like Wireshark, Nmap, and SIEM platforms to protect and monitor enterprise environments. Decorence Global Services January 2018 – June 2019 Cyber Security Analyst

Completed end-to-end security lab simulations based on Security+ domains, including threat analysis, risk mitigation, secure system design, and identity management.

Performed vulnerability assessments using Nessus and OpenVAS, interpreting CVSS scores and prioritizing findings based on asset criticality.

Investigated simulated cyber incidents, including phishing, brute-force attacks, and malware infections, following NIST 800-61 incident response framework (Preparation, Detection, Containment, Eradication, Recovery, Lessons Learned).

Used Wireshark to analyze packet data, detect suspicious traffic patterns (e.g., DNS tunneling, port scanning), and create network baselines.

Practiced access control techniques, including role-based access (RBAC), least privilege enforcement, and MFA configuration in a virtual Active Directory environment.

Built and tested firewall rules, monitored traffic logs, and simulated attacks using Kali Linux tools (e.g., Nmap) to validate defense mechanisms.

Developed and documented security playbooks and created mock compliance reports referencing NIST, ISO 27001, and GDPR guidelines.

Tools & Technologies: Kali Linux, Nessus, OpenVAS, Nmap, Wireshark, VirtualBox, Windows Server, Active Directory.

I3 Info Tech February 2016 – May 2016

IT Support Specialist

Provided Tier 1 and Tier 2 support for end-user devices, with added responsibilities in supporting cybersecurity efforts across endpoints and servers.

Deployed and managed endpoint protection software (Microsoft Defender for Endpoint), ensuring proper AV configurations, automatic updates, and periodic threat scans.

Helped implement Multi-Factor Authentication (MFA) via Microsoft Azure and Office 365 Admin Center to strengthen authentication across organizational accounts.

Created and managed user access control using Active Directory, enforcing password policies, group- based permissions, and regular access reviews.

Trained users on cyber hygiene best practices, including email phishing detection, password management, and safe browsing, resulting in a 30% drop in user-reported phishing incidents.

Monitored system patching cycles and coordinated with the IT security team to apply security patches, update configurations, and remove deprecated software.

Reported and escalated suspicious system behavior, account lockouts, and firewall blocks to the SOC team for further investigation.

Participated in annual internal audits and supported documentation of IT security controls for compliance readiness (HIPAA and SOC 2).

Tools & Technologies: Windows Server, Active Directory, Microsoft Defender, Office 365 Security & Compliance Center, Azure AD, Group Policy

Relevant Projects:

1. Vulnerability Assessment and Risk Reporting (Lab-Based) Objective: Identify and analyze vulnerabilities on a simulated enterprise network. Description:

Deployed a vulnerable virtual machine using Metasploitable and scanned the system using Nessus and OpenVAS.

Interpreted scan results, categorized findings by CVSS score, and prioritized remediation based on business impact.

Created a formal Risk Assessment Report detailing vulnerabilities, risk levels, recommended actions, and affected systems.

Mapped vulnerabilities to relevant MITRE ATT&CK techniques and NIST 800-30 risk management guidelines.

Tools Used: Nessus, OpenVAS, Metasploitable, Nmap, CVSS Calculator, MS Word (for report writing) 2. Network Traffic Analysis and Threat Detection

Objective: Monitor and detect suspicious network activity using packet analysis. Description:

Captured live network traffic using Wireshark on a virtual lab environment with simulated attacks (e.g., port scans, DNS spoofing).

Identified and analyzed abnormal traffic patterns such as SYN floods, ARP spoofing, and malformed packets.

Created a detailed Incident Detection Report highlighting attack signatures and remediation recommendations.

Practiced network hardening techniques such as disabling unused ports, enforcing secure protocols, and configuring basic firewall rules.

Tools Used: Wireshark, Security Onion, VirtualBox, TCPDump, Kali Linux (for simulated attacks) 3. Identity and Access Management (IAM) Implementation Objective: Design and implement secure user access policies using Active Directory. Description:

Set up a Windows Server Active Directory domain with multiple user roles and groups.

Implemented Role-Based Access Control (RBAC) by assigning permissions based on roles (e.g., HR, Finance, IT).

Enforced password policies, account lockout thresholds, and configured Group Policy Objects (GPOs) for workstation security.

Integrated Multi-Factor Authentication (MFA) for Office 365 accounts using Azure AD Conditional Access. Tools Used: Windows Server 2019, Active Directory, Azure AD, Group Policy Management Console, Office 365 Admin Center

Educational Qualification:

Master of Computer Application at Gujarat Technological University Bachelor of Computer Application at Veer Narmad South Gujarat University Certifications:

CompTIA Security+ (SY0-701), CompTIA — Certified June 2025



Contact this candidate