top of page

ADIL MONU L. PRABHAKAR

CYBER SECURITY ANALYST

Untitled design (1).png

ABOUT ME

Cybersecurity professional with a solid foundation in system administration and IT support, complemented by hands-on experience in vulnerability management, incident response, and compliance with international security standards such as ISO 27001 and PCI DSS. Proficient in leveraging industry-leading tools like Splunk, Metasploit, and Nessus to assess and mitigate security risks effectively. Demonstrated ability to manage and secure complex systems, ensuring optimal uptime and reliability.

An MSc Cybersecurity graduate with a proven academic and project track record, including advanced studies in penetration testing, digital forensics, and malware analysis. Passionate about innovative problem-solving, exemplified through research and practical implementations such as blockchain-based cloud storage and brainwave-driven home automation for disabled individuals.

SKILLS

Areas of Expertise

  • Vulnerability Assessment

  • Penetration Testing

  • SIEM

  • Security Governance

  • ISO 27001/27002

  • Reporting

  • Network Security

  • Vulnerability Management

  • Incident Response

  • Endpoint Security

  • Cloud Security

  • Programming & Scripting Languages

October 2023 – September 2024

Section Leader/Duty Manager /

ASDA, London

  • Oversee daily store operations, ensuring smooth functionality and adherence to company policies.

  • Manage and lead a team of 39 staff across various departments, delegating tasks and monitoring performance.

  • Handle customer inquiries and complaints, providing effective resolutions to maintain high customer satisfaction.

  • Ensure compliance with health and safety regulations, performing regular checks and addressing any concerns.

  • Coordinate with department heads to ensure staffing levels and operational needs are met during shifts.

  • Train and mentor staff, fostering a productive and motivated work environment.

  • Manage and resolve operational issues, minimizing disruptions to store performance.

November 2022 – January 2024

Jr. Security Analyst /

Vasave Financial Service, London

  • Performing information system security vulnerability scans to identify and analyze vulnerabilities, as well as to assess risks to networks, operating systems, applications, database, and other components of the information system.

  • Conducting thorough risk assessments of IT infrastructure and delivering comprehensive analysis reports to relevant stakeholders.

  • Collaborated with cross-functional teams to provide expert security guidance on ongoing projects, enhancing overall project security posture.

  • Validated the effectiveness of security controls through regular assessments, maintaining adherence to regulatory compliance.

  • Continuously maintained and updated certification documentation to reflect changes in policies, standards, and compliance requirements.

  • Provided detailed incident reports, including sandboxing, IP reputation analysis, and in-depth examination of Indicators of Compromise (IOCs).

  • Executed base-level remediation actions, such as blocking user accounts and isolating servers, to facilitate triage for Level 2 investigations.

  • Investigated alerts using SIEM tools, data visualization techniques, pattern analysis, and automation to enhance incident detection and response capabilities.

  • Analyzed and reported on anomalous behavior to identify potential security threats and improve incident response strategies

2018 – 2020

System Adminitrator

Yours Digital, India

  • Maintained 30+ servers, ensuring uptime of 99.9% by conducting regular updates and performance checks.

  • Configured and secured network devices, enhancing firewall performance and reducing security incidents by 15%.

  • Managed user accounts and permissions for a network of 50+ employees, reducing access-related issues by 40%.

2017 – 2018

IT Support /

Sutherland Global, India

  • Led a team of IT support specialists, providing guidance and support to enhance team performance and service delivery.

  • Documented troubleshooting steps and solutions in the ticketing system to maintain a knowledge base.

  • Managed escalated support tickets, ensuring timely resolution and effective communication with affected users.

  • Facilitated regular team meetings to discuss challenges, share knowledge, and celebrate successes.

WORK EXPERIENCE

EDUCATION

Master of Science in Cyber Security

DeMontfort University, Leicester, UK / Graduated:2022

Key Modules: Foundation of Cyber Security, Cyber Threat Intelligence, Host and network security, Penetration testing and Incident Response, Cyber Engineering, Digital forensics, Malware analysis, Legal ethics and profes

Bachelor of Engineering in Computer Science

Mewar University, India / Graduated:2017

CERTIFICATIONS

Certified Ethical Hacker v11 (CEH)

Blue Team Level 1 (BTL1)

Web Application Hacking and Security

Certified Secure Computer User (CSCU)

Azure Fundamentals (AZ-900

Threats are puzzles waiting to be solved.

Threats are like intricate puzzles, each piece holding vital clues to understanding vulnerabilities. By analyzing these challenges, we can decipher patterns and uncover solutions. where solving these puzzles not only enhances our defenses but also equips us with the knowledge to anticipate and mitigate future risks.

Defense is an art that evolves daily.

Defense is a constantly evolving art. Each day brings new threats and tactics, requiring adaptability and innovation. I embrace this dynamic landscape, learning from challenges and refining my strategies. Here, I share insights and approaches from my journey, highlighting the importance of resilience and creativity in safeguarding against ever-changing digital vulnerabilities. Join me in exploring this fascinating field.

Every byte has a story – I’m here to uncover it.

Every byte of data carries its own narrative, offering insights into user behavior, system vulnerabilities, and emerging threats. My mission is to delve into these digital stories, analyzing patterns and anomalies to uncover hidden risks. Through this exploration, I seek to transform raw data into actionable intelligence, turning potential threats into opportunities for innovation and stronger defenses.

IN MY WORLD:

bottom of page