Responsibilities
• Managing SOC (Security Operations Center)
• SIEM (IBM QRadar and RSA Netwitness) Administration and Optimizations
• Perform regular health checks and run scripts to find problematic aggregated data, rule, offenses, dashboards and reports.
• Asset Integrations and Event Optimizations in SIEM
• Develop and Implement Effective Use-cases to Hunt Anomalies and generate Alerts for pro-active monitoring
• Review and correlate SIEM data to improve notable event identification
• Initial Triage analysis of security alerts on hosts during investigations and follow procedures of escalation
• Incident Handling using Incident Response Life Cycle
• Automation of Incident Response Life Cycle using SOAR platform SIRP.
• Vulnerability and Risk Assessment Exercises
• Preparation of weekly/monthly executive security reports to meet compliance and SLA
Tools: Nmap, Nessus, Nexpose, Wireshark, Metasploit, Burp Suite, Tenable Security Center
Products: FireEye, TrendMicro, IBM QRadar, RSA Security Analystics
Framework: NIST, SOC2
Experienced cyber security professional with a demonstrated history of working in the Information Security and Telecommunication/ISP Industry. Skilled in implementing and optimizing secure network infrastructure. Adroit in incident handling and incident response while being a part of SOC Team.
Appreciate innovation in work environment welcomes challenging opportunities.
Experience as NOC Engineer was Dynamic. Had to work or various projects coping with day to day operations.
It was challenging yet learning experience as my initial career step.