Work Experience
Security Engineer intern | Cantonica · Internship
Currently, I am actively contributing to vulnerability web scanning. My primary responsibilities revolved around some of the main things I did :
- Conduct comprehensive web vulnerability scans, document findings, and collaborate with teams for remediation
- Perform open port scans, analyze results, and prioritize risks using the MITRE ATT&CK framework
- Assist in incident response and mitigation, including developing plans and investigating security incidents
- Contribute to the setup and configuration of a SIEM platform and integrate it with existing security infrastructure
- Stay updated with cybersecurity trends and participate in relevant training and certifications
Cybersecurity Analyst | Defender Endpoint Expert (DEX) Hunter | Microsoft365 DefenderCybersecurity Analyst | Defender Endpoint Expert (DEX) Hunter | Microsoft365 Defender LTIMindtree · Full-time
- Analyzed malware samples in infected MS Office files with Macro's code to pinpoint malicious behavior and network-related artifacts
- Tracked malware behavior using tools like Procmon, Fiddler, Reg shot to understand the attack vector and pinpoint potential vulnerabilities
- Examined executable, script files, office files, and PDF to uncover malicious behavior and network-related artifacts
- Implemented knowledge of injection techniques, Windows API, legit IP, and domains to identify potential threats and vulnerabilities
- Analyzed over 200 Falcon/Carbon Black alerts and over 1000 true positive files deleted by remoting the end-user machine to pinpoint potential threats and vulnerabilities
- Developed and maintained over 100 documents for security systems and procedures steps to ensure compliance with industry standards and best practices
- Conducted basic hunting for atomic indicators across enterprise event data to pinpoint potential threats and vulnerabilities
- Specialized in vulnerability assessment and remediation, with hands-on experience in maintaining and configuring IDS for optimal threat detection in Linux environments
- Followed the Change process strictly during implementation in the production environment to ensure compliance with industry standards and best practices. Coordinated with regulatory, internal control, and audit requirements
- Handled over 100 escalation cases with high severity and threat intent, involving malicious activities, to pinpoint potential threats and vulnerabilities
Threat Researcher | Microsoft Threat Experts (MTE) | Incident Response Mindtree · Full-time
In my role at Microsoft Threat Experts in Mindtree, I fortified digital landscapes
against cyber threats through comprehensive research and strategic analysis. My pivotal role involved:
- Cyber Threat Intel Analysis: Applied advanced techniques for proactive threat assessment
- Behavioral Analysis: Used techniques to understand and neutralize malicious activities
- Incident Response: Spearheaded swift responses, ensuring a resilient cybersecurity posture
- Cyber Threat Hunting: Proactively detected threats using advanced methodologies
- Kill Chain Analysis: Strengthened security through comprehensive analysis
- Security Automation: Implemented processes for rapid response, reducing manual workload
- MITRE ATT&CK Framework: Utilized threat mapping techniques for adversary tactics
- Incident Management: Proficiently handled incidents, enhancing security accuracy
- Risk Management: Ensured compliance with Risk Management Plans and regulations
- Security Awareness Training: Conducted 100+ sessions, fostering cybersecurity awareness
- Collaborative Leadership: Coordinated with cross-functional teams, promoting teamwork
These skills highlight my proficiency in cybersecurity technologies, making me a proactive asset in the evolving threat landscape.