Avinash Resume
Avinash Resume
Avinash Resume
(781)-474-0905 | APOTHU_GPS@NEC.EDU
SUMMARY OF QUALIFICATIONS:
Technical Skills:
Networking Endpoint detection and response, IDS/IPS, Security Operation Center,
Technologies Forensic analysis,
Networking Hardware Cisco Switches, Cisco Routers, Aruba Access points.
Forensic Technologies Encase, FTK Imager, Autopsy, SIFT
Security Technologies Forcepoint, Splunk, Symantec Endpoint, OWASP, Crowdstrike
Security Tools Rapid 7, Qualys, Metasploit, Nessus, Threat connect, Tenable, Nikto,
Burp Suite, Security Onion, SQL Map
SIEM Tools Splunk, TCP Dump, Suricata, BRO, Night Hawk
Network Monitoring Solar winds, Wireshark, TCP Dump, Infoblox
Operating Systems Windows, KALI LINUX, Parrot Sec
Programming Python
Languages
Firewalls ASA, Checkpoint.
Education Details:
New England College, Henniker, NH, USA March 2017 – May 2018
Master of Science in Computer Information Systems.
Certifications:
Mile2 Certified Vulnerability Assessor
ISC2 Certified In Cyber Security
Rapid7 Nexpose Certified Administrator
Qualys Certified Vulnerability Management Specialist
Fortinet Network security expert Level 1& 2.
Checkpoint (156-411) cybersecurity jumpstart certified.
Professional Experience:
TikTok, Mountain View, CA May 2022 – Present
Vulnerability Management Analyst
Responsibilities:
Develop, maintain, and support Home Depot’s technical infrastructure that includes
network, hardware, systems, etc.
Research and analyze business trends and behavioral data to identify opportunities for
improvements and new initiatives.
Proactively create and maintain tools for monitoring and support.
Collaborate with product and project teams to understand needs and enable them with
infrastructure.
Develop and execute a strategy for vulnerability management and risk reduction that aligns
global best practices.
Oversee and support the continuous improvement of the vulnerability management
program, processes, and technology integrations.
Produce detailed reports for key stakeholders, with metrics documentation of the risk
identified and clear recommendations for remediation actions for found vulnerabilities.
Support technical assessment of third-party vendors and provide remediation suggestions
to IT stakeholders.
Maintain clear RACI of VM operations process and procedures.
Obtain and maintain knowledge on existing security procedures and directives related to
vulnerability management.
Provide direction and support of operational tools and processes for identifying and
communicating vulnerable items for vulnerability management infrastructure.
Responsibilities:
Responsible for day-to-day operational support for the Vulnerability Management Service.
Have good experience working towards analyzing and supporting vulnerability remediation
for endpoints.
Working on SCCM, Tanium and similar tools.
Providing remediation solutions for 3rd party applications vulnerabilities like java, adobe,
MS Office etc.
Providing remediation solutions to packaging teams on vulnerabilities which may require
certain configuration changes.
Analyze vulnerability reports to ensure data accuracy, false positive analysis, to provide
technical vulnerability analysis and determine remediation options.
Work on categorizing the vulnerabilities based on type and provide remediation solution to
the endpoint patch management team.
Create various scan reports for remediation and Export vulnerability data into various
reports formats required by customer.
Help client with Vulnerability Management related questions including those related to
remediation procedures and coordinating with the client for overall vulnerability
management governance.
Coordinate with various client support teams for queries on vulnerabilities and track
successful remediation.
Responsibilities:
Support the evaluation, qualification, testing and delivery of security architecture
improvement, obsolescence replacement and vulnerability response projects in a multi-
tenant/requirement environment.
Support Information Assurance (IA) data collection and continuous monitoring updates for
assigned security architectures.
Prepare security assessment plan, secure resources, and hold kick-off meetings prior to
assessment.
Responsible for Security Information and Event Management (SIEM), Vulnerability
Management, Incident Management & Response.
Lead for configuring and managing Rapid 7 Nexpose tool to conduct vulnerability
management. Schedule weekly or monthly scans as requested by division agencies.
Track emerging and ongoing cyber and physical threats using various sources. Compile and
validate data from internal, commercial, and open sources to recognize threat trends and
patterns.
Process indicators of compromise and threat actor TTPs for correlation, detection and
alerting in appropriate security tools
Share timely intelligence and insights with internal and external partners to enhance
situational awareness of the global threat landscape.
Monitors all information security related systems intended to provide incident reporting or
predictive analysis of the systems.
Documenting process to identify gaps and provide process enhancement recommendations.
Lead role in all security and privacy compliance efforts. Compliance includes NIST, PCI, CIS
and IRS PUB-10.
Assisted with the development, documentation, and implementation of IRS safeguards
process to ensure all controls are compatible with IRS guidelines.
Installed, configured, and administered information security technologies intended to
protect assets from internal and external threats.
Assists in defining, creating, and implementing banks Information Security
Policy/Standards, Guidelines.
Responded to Information Security incidents. Responsible for Security Information and
Event Management (SIEM), Vulnerability Management, Incident Management, and
response.
Works with auditors.
Reviewed and approval of the system/network configuration changes, system patches and
updates according to the departments procedures.
Reviewed compliance with the information security policy and standards. Provides periodic
reporting on information security issues and gaps
Configured and troubleshoot McAfee ePO policies for managed systems on production
networks and provide system administrator support.
Monitored for alerts and suspicious activity on hosts by using end point solutions like
McAfee ePo and Crowdstrike.
Worked with open-source threat intelligence and hunt threats, analyze spam emails etc.
Managed, monitor security tools and systems.
Reviewed and approval of the system/network configuration changes, system patches and
updates according to the departments procedures.
Provided high quality work ensuring accuracy and seeking to continuously improve
information security processes by embracing new and better ways of doing things.
Execution of McAfee Policy Orchestrator and McAfee Endpoint Security Protection
enterprise suite of software.
Responsible for implementing, configuring, and maintaining vulnerability and compliance
scanning tools such as Qualys guard, Rapid7 and Tenable.
Conducted scheduled and ad hoc application and system scans, researching and analyzing
vulnerabilities, identifying relevant threats, corrective action recommendations,
summarizing and communicate findings effectively by using Rapid 7 InsightVM.
Generated scheduled and ad-hoc reports for different vulnerability scans using Rapid 7
InsightVM and Tenable Nessus.
Categorized and prioritize vulnerabilities based on MITRE ATT&CK level and recommend
remediation steps for different teams.
Worked with Splunk enterprise to identify and address emerging security threats using
continuous monitoring, alerting, and analytics.
Developed security processes and procedures and support service-level agreements (SLA)
to ensure that security controls are managed and maintained.
Research, evaluate and recommend information security related hardware and software,
including developing business cases for security investments.
Developed common set of security tools. Define operational parameters for their use and
conduct reviews of tool output.
Developed and maintain A&A security artifacts. Analyze information gathered by the team.
Processes both internal and external Cyber Threat Intelligence for determination of
impact, hunting to determine scope, and implementation of mitigations to defend
enterprise.
Onboarding Threat intelligence information from multiple sources by using formats
like STIXX & TAXII, XML and Suricata/Yara alert rules.
Responsibilities:
Planned and conduct continuous monitoring as recommended in the NIST 800-137
publication on all active department system.
Will focus on Incident Response. Hunt for signs of APT activities.
Identified security issues and risks associated with security events and manage the incident
response process.
Participated in the incident response and investigation process for identified security
events.
Use the Security Incident Event Management (SIEM) platform (IBM’s QRadar) to perform
Incident Response identification and response.
Conducted scheduled and ad hoc application and system scans, researching and analyzing
vulnerabilities, identifying relevant threats, corrective action recommendations,
summarizing and communicate findings effectively by using Rapid 7 InsightVM.
Generated scheduled and ad-hoc reports for different vulnerability scans using Rapid 7
InsightVM and Tenable Nessus.
Performed network and system forensics in response to security incidents.
Optimized and customize security-monitoring tools to improve detection.
Maintained and update the security operational workflow.
Vulnerability assessment using Tenable cloud scanner and Qualys Guard.
Categorized vulnerabilities based on the results from tenable. Assets management using
tenable cloud scanner.
SIEM log analysis using Splunk enterprise tools. Finding events from log sources using
Splunk.
Provided technical expertise and security guidance for enterprise network security defense-
in-depth strategies.
Performed Vulnerability assessment, Penetration testing, Risk Analysis and Security
assessments. Penetration testing using Metasploit, and Rapid 7.
Assisted in security audit findings documentation, verification, and resolution to ensure that
NH State House security frameworks is in line with NIST standards.
Documented and uploads security findings, remediation plans and exception requests as
identified by the team.
Assisted with ongoing security projects as defined by the manager.
Gathering threat intelligence about emerging malware using open-source threat intelligence
sources.
Maintaining CIA (Confidentiality, Integrity, Availability).
Intrusion monitoring using opensource tools such as BRO, Suricata, Night Hawk, Cain &
Able.
Reviewd security events that are populated in a Security Information and Event
Management (SIEM) system.
Responsibilities:
Research on current and new security threats to stay informed.
Instructs students in classroom, lab, learning center as appropriate.
Provides student contact before or after class or through telephone or email.
Prepares, distributes and utilizes instructional support materials, including course syllabi,
supplementary materials.
Actively participate in the labs for threat detection modules.
Demonstrate incident monitoring using SPLUNK enterprise and other tools in the lab.
Demonstrate SQL Injection, Vulnerability assessment and penetration testing using open
source and enterprise tools.
Working with KALI and Parrot Sec Linux systems in labs.
Blocking and controlling access to social networking sites at the time of class using Cain &
Abel and other IDS/IPS tools.
Wireshark packet capturing and analysis of packets in labs.
Forensics evaluation demonstration using Open Source and Enterprise tools.
Worked with Tenable cloud scanner on vulnerability assessments and categorizing them
using CVE
Provide security awareness training on social engineering and ransomware attacks.
Responsibilities:
Ensure proper system categorization using NIST 800-60, Implement appropriate security
controls for information system based on NIST 800-53.
Routinely conduct security analysis and provide written and/or oral
recommendations to stakeholders.
Monitored traffic passing through firewalls and created new policies and helped to improve
security concerns and blocked unnecessary traffic.
Perform risk analysis and management as requested by clients.
Analyze and investigate intrusion attempts and perform in-depth analysis of exploits.
Creating policies using Bluecoat SG proxy. Intercepting, blocking and URL filtering using
Bluecoat proxy.
Vulnerability Management using Qualys Guard Express and remediated vulnerabilities.
Security awareness training for new and existing employees.
Coordinate and manage team activities during assessment engagements.
Establish schedules and deadlines for assessment activities.
Threat intelligence collection using open-source networks.
Investigate security incidents and recommend actions needed to resolve situations.
Performing routine SQL Injection attacks and remediate them.
Preventing Data loss by working with Symantec endpoint protection.
Configuration and maintenance of ACL list on Aruba Access points.
Familiar with Vulnerability Scanning Tools such as Tenable Cloud Scanner, Nessus and
analyses reports to vulnerabilities.
Managing and providing support to various project teams with regards to the addition of
new equipment such as routers switches and firewalls to the DMZs.
Conducted vulnerability testing using tools: Nessus, Burp suit, Tenable, and analyzed
reports.
Conduct IT controls risk assessment to identify system threats, vulnerabilities and risk, and
generate reports.
Developed System Security Plan to provide an over life of the system security requirements.
Track security activities of assigned systems and brief leadership on said activities.
Provide technical support, assisting users facing network problems. Perform advanced
troubleshooting, diagnostics and provide level-1 solutions to network failures
Attend Security Training as requested by senior leadership.
Develop, plan and maintain documentation necessary for operation in support of LAN to
WAN connectivity.
Worked on bluecoat proxy to optimize WAN Performance by analyze and scan malwares to
protect the infrastructure and URL filtering