S KIRUTHIKA
SOC ANALYST – TIER III
Expertise
•
Contact
Experience with real time Threat Awareness/Continuous Monitoring
that includes: Operational experience, Firewall management,
Security Information and Event Management (SIEM), and the ability
to identify threats on the network and in the detection, response,
mitigation, and/or reporting of cyber threats affecting client
networks.
•
Demonstrated ability to work under pressure and deliver to meet
SLA’s and Perform analysis of log files.
•
Monitoring and analyzing logs and alerts from a variety of different
technologies (IDS/IPS, Firewall, Proxies, Anti-Virus, etc…)
investigating intrusion attempts and performing in depth analysis of
exploits and attacks.
--38/4 a Shankar Nagar,
Aerodrome Post, Coimbatore641014
linkedin.com/in/kiruthika-s-
•
Specific understanding of Threat hunting, Threat assessment,
TOOLS KNOWN
EDUCATION
operating system, vulnerability assessments, Penetration Testing,
TCP/IP ,OSI Model LAN/WAN network fundamentals, intrusion
systems,
firewalls, VPNs, WAFs, SIEM, HIDS/NIDS//IPS,
MEdetection
– Biometrics
and Cyber
Splunk
data loss
prevention,
Application firewalls and Security Incident
Security
IBM
Qradar
Response
PSG
College Techniques
of Technology
Cyber Stellar
8.80
• (First Class with Distinction)
Carbon Black
-)
Kibana
Nmap
BE – Computer Science and
Wireshark
Engineering
Metasploit
Sri Ramakrishna Institute of
Burp Suite
Technology
7.31 (First Class)
-)
PROJECTS
•
PDF Malware Detection
using Machine Learning
Techniques
•
A Game Theoretic
Approach for Malware
Analysis
•
An Android Application
for Image Authentication
and Tamper Detection.
Professional experience
August 2020 - Present
CYBER SECURITY ANALYST – TIER III - Ernst & Young LLP, Chennai , India
•
•
•
Continuous monitoring of security events to determine intrusion, malicious events and
Threats using Splunk, IBM QRadar , Cyber Stellar and Kibana in a timely manner; triage
details and provide support to client end.
Demonstrated SIEM utilization skills, including the ability to review and analyses
security events from various monitoring and logging sources to identify or confirm
suspicious activity and Provide Suggestions of Creating new rules and for finetuning on
existing rules.
Document all activities during an incident and provide support with status updates
during the life cycle of the incident
•
Monitoring email, web, DNS logs, IOC, Inbound and Outbound Traffic for the firewall,
investigate the events and correlate data by researching logs, analyzing graphs and
Packet inspection to provide detailed customer reports.
•
Working on assigning and creating tickets on (Manage engine, Freshworks and Rocket
ticketing tool) and understanding and fulfilling the expectations on all tasked SLA
Commitments.
Investigate Malicious phishing emails, domains and IPs using Open Source tools(e.g.,
Virustotal, Abuseipsb, IPvoid and Mxtoolbox) and recommend proper blocking based on
analysis.
•
Dec 2019 – Aug 2020
CYBER SECURITY INTERN - ERNST & YOUNG LLP, CHENNAI, INDIA
•
•
•
Performing Threat Hunting for Various clients using Splunk and IBM Qradar
Performing VAPT using various online tools.
Monitoring real time security events on SIEMs and event Analysis and investigating
and Reporting to respective clients.
TECHNICAL CERTIFICATIONS
TECHNICAL CERTIFICATIONS
•
•
•
•
•
•
•
•
•
PAPERS
•
Completed SPLUNK
Fundamentals
1 &Fundamentals
2 from Spunk 1Inc.
• Completed
SPLUNK
& 2 from Spunk Inc.
Completed Certified
Secure Computer
User from
EC Council.
• Completed
Certified Secure
Computer
User from EC Council.
Participated in• Cyber
talk
series
on:
Participated in Cyber talk series on:
o Tactics & Measures
for Ransomware
o Tactics
& MeasuresinforAWS
Ransomware in AWS
o CybersecurityoRiskCybersecurity
for SMB - Defending
from
Big Business
Threats from Big Threats
Risk foryour
SMBBusiness
- Defending
your
o How To Protect,
Detect
and
Mitigate
Your
IT
Environments
Against
Cyber Crime Against Cyber
o How To Protect, Detect and Mitigate Your IT Environments
o Threat Hunting Workshop
–
Will
you
be
the
Hunter
or
the
Hunted?
Crime
o Implications ofoRevised
Risk Management
Conducted
Falcon Experience
ThreatTechnology
Hunting Workshop
– Will youGuidelines
be the Hunter
or the by
Hunted?
Zone (CrowdStrike)
o Implications of Revised Technology Risk Management Guidelines Conducted
by Falcon Experience Zone (CrowdStrike)
Participated in Webinar on Web Security Organized by IEEE Computer Society Kerala Chapter.
Completed Pen
and securing
Web Applications,
BurpOrganized
Suite: In depth
Survival
Guide
Course
from
• testing
Participated
in Webinar
on Web Security
by IEEE
Computer
Society
Kerala
Udemy.
Chapter.
Completed Ethical
Hacking, Wireshark
Packet
from Udemy.Burp Suite: In depth Survival
• Completed
Pen testing
and Analysis
securingcourse
Web Applications,
Participated in Cyber
Disease
Ethical
Hacking
Workshop
cum CTF Event Conducted by i3indya
Guide Course from Udemy.
Technologies in
Aakaar’s20
Bombay.Packet Analysis course from Udemy.
• Association
Completedwith
Ethical
Hacking,IIT
Wireshark
Participated in• theParticipated
Cyber Security
Awareness
Program
Conducted
by PSGcum
Institute
of Management
and
in Cyber Disease Ethical Hacking
Workshop
CTF Event
Conducted by
CAP Wing.
i3indya Technologies in Association with Aakaar’s20 IIT Bombay.
Participated in• the
Training Course
OneSecurity
Day End
User Security
Awareness
Program
Participated
in the of
Cyber
Awareness
Program
Conducted
by PSGConducted
Institute ofby
Cybrary.
Management and CAP Wing
Presented a "Malicious PDF Detection: A Survey and Taxonomy" in "National National Conference on
Intelligence, Computing and Communication (NCICC-2020)" conducted by PSG College of Technology
AREAS OF INTEREST
•
•
•
Information Security
Penetration Testing and Vulnerability Analysis
Threat Hunting and Detection
AWARDS
•
EY KUDOS AWARD - This award Recognizes exceptional commitment towards delivering excellence.
TICKETING TOOLS KNOWN
•
Manage Engine Ticketing tool, Fresh works and Rocknet
Languages: C, C++ and Python(Basic)
DECLARATION
I hereby declare that the information furnished above is true to the best of my knowledge and belief, if given
chance, I can Prove myself.
S.Kiruthika