Kiruthika

Kiruthika

$5/hr
Responsible cyber Security Analyst , video creator , MCQ creator and logo design
Reply rate:
-
Availability:
Part-time (20 hrs/wk)
Location:
Coimbatore, Tamilnadu, India
Experience:
2 years
S KIRUTHIKA SOC ANALYST – TIER III Expertise • Contact Experience with real time Threat Awareness/Continuous Monitoring that includes: Operational experience, Firewall management, Security Information and Event Management (SIEM), and the ability to identify threats on the network and in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks. • Demonstrated ability to work under pressure and deliver to meet SLA’s and Perform analysis of log files. • Monitoring and analyzing logs and alerts from a variety of different technologies (IDS/IPS, Firewall, Proxies, Anti-Virus, etc…) investigating intrusion attempts and performing in depth analysis of exploits and attacks. --38/4 a Shankar Nagar, Aerodrome Post, Coimbatore641014 linkedin.com/in/kiruthika-s- • Specific understanding of Threat hunting, Threat assessment, TOOLS KNOWN EDUCATION operating system, vulnerability assessments, Penetration Testing, TCP/IP ,OSI Model LAN/WAN network fundamentals, intrusion systems, firewalls, VPNs, WAFs, SIEM, HIDS/NIDS//IPS, MEdetection – Biometrics and Cyber Splunk data loss prevention, Application firewalls and Security Incident Security IBM Qradar Response PSG College Techniques of Technology Cyber Stellar 8.80 • (First Class with Distinction) Carbon Black -) Kibana Nmap BE – Computer Science and Wireshark Engineering Metasploit Sri Ramakrishna Institute of Burp Suite Technology 7.31 (First Class) -) PROJECTS • PDF Malware Detection using Machine Learning Techniques • A Game Theoretic Approach for Malware Analysis • An Android Application for Image Authentication and Tamper Detection. Professional experience August 2020 - Present CYBER SECURITY ANALYST – TIER III - Ernst & Young LLP, Chennai , India • • • Continuous monitoring of security events to determine intrusion, malicious events and Threats using Splunk, IBM QRadar , Cyber Stellar and Kibana in a timely manner; triage details and provide support to client end. Demonstrated SIEM utilization skills, including the ability to review and analyses security events from various monitoring and logging sources to identify or confirm suspicious activity and Provide Suggestions of Creating new rules and for finetuning on existing rules. Document all activities during an incident and provide support with status updates during the life cycle of the incident • Monitoring email, web, DNS logs, IOC, Inbound and Outbound Traffic for the firewall, investigate the events and correlate data by researching logs, analyzing graphs and Packet inspection to provide detailed customer reports. • Working on assigning and creating tickets on (Manage engine, Freshworks and Rocket ticketing tool) and understanding and fulfilling the expectations on all tasked SLA Commitments. Investigate Malicious phishing emails, domains and IPs using Open Source tools(e.g., Virustotal, Abuseipsb, IPvoid and Mxtoolbox) and recommend proper blocking based on analysis. • Dec 2019 – Aug 2020 CYBER SECURITY INTERN - ERNST & YOUNG LLP, CHENNAI, INDIA • • • Performing Threat Hunting for Various clients using Splunk and IBM Qradar Performing VAPT using various online tools. Monitoring real time security events on SIEMs and event Analysis and investigating and Reporting to respective clients. TECHNICAL CERTIFICATIONS TECHNICAL CERTIFICATIONS • • • • • • • • • PAPERS • Completed SPLUNK Fundamentals 1 &Fundamentals 2 from Spunk 1Inc. • Completed SPLUNK & 2 from Spunk Inc. Completed Certified Secure Computer User from EC Council. • Completed Certified Secure Computer User from EC Council. Participated in• Cyber talk series on: Participated in Cyber talk series on: o Tactics & Measures for Ransomware o Tactics & MeasuresinforAWS Ransomware in AWS o CybersecurityoRiskCybersecurity for SMB - Defending from Big Business Threats from Big Threats Risk foryour SMBBusiness - Defending your o How To Protect, Detect and Mitigate Your IT Environments Against Cyber Crime Against Cyber o How To Protect, Detect and Mitigate Your IT Environments o Threat Hunting Workshop – Will you be the Hunter or the Hunted? Crime o Implications ofoRevised Risk Management Conducted Falcon Experience ThreatTechnology Hunting Workshop – Will youGuidelines be the Hunter or the by Hunted? Zone (CrowdStrike) o Implications of Revised Technology Risk Management Guidelines Conducted by Falcon Experience Zone (CrowdStrike) Participated in Webinar on Web Security Organized by IEEE Computer Society Kerala Chapter. Completed Pen and securing Web Applications, BurpOrganized Suite: In depth Survival Guide Course from • testing Participated in Webinar on Web Security by IEEE Computer Society Kerala Udemy. Chapter. Completed Ethical Hacking, Wireshark Packet from Udemy.Burp Suite: In depth Survival • Completed Pen testing and Analysis securingcourse Web Applications, Participated in Cyber Disease Ethical Hacking Workshop cum CTF Event Conducted by i3indya Guide Course from Udemy. Technologies in Aakaar’s20 Bombay.Packet Analysis course from Udemy. • Association Completedwith Ethical Hacking,IIT Wireshark Participated in• theParticipated Cyber Security Awareness Program Conducted by PSGcum Institute of Management and in Cyber Disease Ethical Hacking Workshop CTF Event Conducted by CAP Wing. i3indya Technologies in Association with Aakaar’s20 IIT Bombay. Participated in• the Training Course OneSecurity Day End User Security Awareness Program Participated in the of Cyber Awareness Program Conducted by PSGConducted Institute ofby Cybrary. Management and CAP Wing Presented a "Malicious PDF Detection: A Survey and Taxonomy" in "National National Conference on Intelligence, Computing and Communication (NCICC-2020)" conducted by PSG College of Technology AREAS OF INTEREST • • • Information Security Penetration Testing and Vulnerability Analysis Threat Hunting and Detection AWARDS • EY KUDOS AWARD - This award Recognizes exceptional commitment towards delivering excellence. TICKETING TOOLS KNOWN • Manage Engine Ticketing tool, Fresh works and Rocknet Languages: C, C++ and Python(Basic) DECLARATION I hereby declare that the information furnished above is true to the best of my knowledge and belief, if given chance, I can Prove myself. S.Kiruthika
Get your freelancer profile up and running. View the step by step guide to set up a freelancer profile so you can land your dream job.