ABOUT
Security Analyst
Detail-oriented cybersecurity professional with over 3 years of practical experience, having served as a Junior Security Analyst and Associate Consultant in Risk and Compliance. Proficient in network security, vulnerability assessments, and incident response, with a strong ability to detect and neutralize threats, ensuring the protection of sensitive data. Demonstrated success in implementing cutting-edge security solutions within complex IT infrastructures. Certified in ethical hacking, with a continuous commitment to professional development and staying ahead of emerging cyber threats. Equipped with excellent problem-solving skills and a passion for learning about astrophysics, applying analytical thinking across various disciplines.
SKILLS
Areas of Expertise
-
Vulnerability Assessment
-
Penetration Testing
-
SIEM
-
Security Governance
-
ISO 27001/27002
-
Reporting
-
Network Security
-
Vulnerability Management
-
Incident Response
-
Endpoint Security
-
Cloud Security
-
Programming & Scripting Languages
October 2023 – September 2024
Section Leader/Duty Manager /
ASDA, London
-
Oversee daily store operations, ensuring smooth functionality and adherence to company policies.
-
Manage and lead a team of 39 staff across various departments, delegating tasks and monitoring performance.
-
Handle customer inquiries and complaints, providing effective resolutions to maintain high customer satisfaction.
-
Ensure compliance with health and safety regulations, performing regular checks and addressing any concerns.
-
Coordinate with department heads to ensure staffing levels and operational needs are met during shifts.
-
Train and mentor staff, fostering a productive and motivated work environment.
-
Manage and resolve operational issues, minimizing disruptions to store performance.
November 2022 – January 2024
Jr. Security Analyst /
Vasave Financial Service, London
-
Performing information system security vulnerability scans to identify and analyze vulnerabilities, as well as to assess risks to networks, operating systems, applications, database, and other components of the information system.
-
Conducting thorough risk assessments of IT infrastructure and delivering comprehensive analysis reports to relevant stakeholders.
-
Collaborated with cross-functional teams to provide expert security guidance on ongoing projects, enhancing overall project security posture.
-
Validated the effectiveness of security controls through regular assessments, maintaining adherence to regulatory compliance.
-
Continuously maintained and updated certification documentation to reflect changes in policies, standards, and compliance requirements.
-
Provided detailed incident reports, including sandboxing, IP reputation analysis, and in-depth examination of Indicators of Compromise (IOCs).
-
Executed base-level remediation actions, such as blocking user accounts and isolating servers, to facilitate triage for Level 2 investigations.
-
Investigated alerts using SIEM tools, data visualization techniques, pattern analysis, and automation to enhance incident detection and response capabilities.
-
Analyzed and reported on anomalous behavior to identify potential security threats and improve incident response strategies
2018 – 2020
Associate consultant - Risk and Compliance /
Yours Digital, India
-
Developed and implemented Information Security Management System controls based on ISO 27001/27002 framework and PCI DSSv3.2.1 security standards.
-
Supported and performed project and enabling functions internal audits to ensure compliance with customer and ISMS security requirements.
-
Conducted various activities, including User Access Review, Risk exception, Incident management, Patch Compliance, Risk Assessment,and Compliance Checks for customers within defined SLAs.
-
Analyzed critical business processes through BIA assessments, developing contingency plans to mitigate risks.
-
Validated critical infrastructure business changes, assessing associated risks and back-out plans.
-
Managed Third-Party Risk Management questionnaires, ensuring adherence to security protocols.
-
Performed network vulnerability assessments, identifying high-risk vulnerabilities, coordinating remediation efforts, and performing subsequent rescans to verify mitigation effectiveness.
-
Performed web application penetration tests focused on identifying and mitigating OWASP Top 10 vulnerabilities during the initial testingphase and facilitated external penetration tests for internal applications
-
Documented Security procedures and policies based on provided inputs, ensuring comprehensive coverage.
-
Coordinated incident response efforts, effectively managing security incidents to minimize business impacts.
-
Collaborated with internal and external stakeholders to ensure regulatory compliance.
-
2017 – 2018
IT Support /
Sutherland Global, India
-
Led a team of IT support specialists, providing guidance and support to enhance team performance and service delivery.
-
Documented troubleshooting steps and solutions in the ticketing system to maintain a knowledge base.
-
Managed escalated support tickets, ensuring timely resolution and effective communication with affected users.
-
Facilitated regular team meetings to discuss challenges, share knowledge, and celebrate successes.
WORK EXPERIENCE
EDUCATION
Master of Science in Cyber Security
DeMontfort University, Leicester, UK / Graduated:2022
Key Modules: Foundation of Cyber Security, Cyber Threat Intelligence, Host and network security, Penetration testing and Incident Response, Cyber Engineering, Digital forensics, Malware analysis, Legal ethics and profes
Bachelor of Engineering in Computer Science
Mewar University, India / Graduated:2017
CERTIFICATIONS
Certified Ethical Hacker v11 (CEH)
Blue Team Level 1 (BTL1)
Web Application Hacking and Security
Certified Secure Computer User (CSCU)
Azure Fundamentals (AZ-900
Threats are puzzles waiting to be solved.
Threats are like intricate puzzles, each piece holding vital clues to understanding vulnerabilities. By analyzing these challenges, we can decipher patterns and uncover solutions. where solving these puzzles not only enhances our defenses but also equips us with the knowledge to anticipate and mitigate future risks.
Defense is an art that evolves daily.
Defense is a constantly evolving art. Each day brings new threats and tactics, requiring adaptability and innovation. I embrace this dynamic landscape, learning from challenges and refining my strategies. Here, I share insights and approaches from my journey, highlighting the importance of resilience and creativity in safeguarding against ever-changing digital vulnerabilities. Join me in exploring this fascinating field.
Every byte has a story – I’m here to uncover it.
Every byte of data carries its own narrative, offering insights into user behavior, system vulnerabilities, and emerging threats. My mission is to delve into these digital stories, analyzing patterns and anomalies to uncover hidden risks. Through this exploration, I seek to transform raw data into actionable intelligence, turning potential threats into opportunities for innovation and stronger defenses.