Work Experience

Security Engineer intern | Cantonica · Internship

Currently, I am actively contributing to vulnerability web scanning. My primary responsibilities revolved around some of the main things I did :

  • Conduct comprehensive web vulnerability scans, document findings, and collaborate with teams for remediation
  • Perform open port scans, analyze results, and prioritize risks using the MITRE ATT&CK framework
  • Assist in incident response and mitigation, including developing plans and investigating security incidents
  • Contribute to the setup and configuration of a SIEM platform and integrate it with existing security infrastructure
  • Stay updated with cybersecurity trends and participate in relevant training and certifications

Cybersecurity Analyst | Defender Endpoint Expert (DEX) Hunter | Microsoft365 DefenderCybersecurity Analyst | Defender Endpoint Expert (DEX) Hunter | Microsoft365 Defender LTIMindtree · Full-time

  • Analyzed malware samples in infected MS Office files with Macro's code to pinpoint malicious behavior and network-related artifacts
  • Tracked malware behavior using tools like Procmon, Fiddler, Reg shot to understand the attack vector and pinpoint potential vulnerabilities
  • Examined executable, script files, office files, and PDF to uncover malicious behavior and network-related artifacts
  • Implemented knowledge of injection techniques, Windows API, legit IP, and domains to identify potential threats and vulnerabilities
  • Analyzed over 200 Falcon/Carbon Black alerts and over 1000 true positive files deleted by remoting the end-user machine to pinpoint potential threats and vulnerabilities
  • Developed and maintained over 100 documents for security systems and procedures steps to ensure compliance with industry standards and best practices
  • Conducted basic hunting for atomic indicators across enterprise event data to pinpoint potential threats and vulnerabilities
  • Specialized in vulnerability assessment and remediation, with hands-on experience in maintaining and configuring IDS for optimal threat detection in Linux environments
  • Followed the Change process strictly during implementation in the production environment to ensure compliance with industry standards and best practices. Coordinated with regulatory, internal control, and audit requirements
  • Handled over 100 escalation cases with high severity and threat intent, involving malicious activities, to pinpoint potential threats and vulnerabilities

Threat Researcher | Microsoft Threat Experts (MTE) | Incident Response Mindtree · Full-time

In my role at Microsoft Threat Experts in Mindtree, I fortified digital landscapes against cyber threats through comprehensive research and strategic analysis. My pivotal role involved:

  • Cyber Threat Intel Analysis: Applied advanced techniques for proactive threat assessment
  • Behavioral Analysis: Used techniques to understand and neutralize malicious activities
  • Incident Response: Spearheaded swift responses, ensuring a resilient cybersecurity posture
  • Cyber Threat Hunting: Proactively detected threats using advanced methodologies
  • Kill Chain Analysis: Strengthened security through comprehensive analysis
  • Security Automation: Implemented processes for rapid response, reducing manual workload
  • MITRE ATT&CK Framework: Utilized threat mapping techniques for adversary tactics
  • Incident Management: Proficiently handled incidents, enhancing security accuracy
  • Risk Management: Ensured compliance with Risk Management Plans and regulations
  • Security Awareness Training: Conducted 100+ sessions, fostering cybersecurity awareness
  • Collaborative Leadership: Coordinated with cross-functional teams, promoting teamwork

These skills highlight my proficiency in cybersecurity technologies, making me a proactive asset in the evolving threat landscape.