Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Avinash Resume

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Avinash

(781)-474-0905 | APOTHU_GPS@NEC.EDU
SUMMARY OF QUALIFICATIONS:

 Possess 7+ years of Information Security Experience with development, implementation


and troubleshooting Network & Security infrastructure.
 Broad knowledge of CIA (Confidentiality, Integrity and Availability), AAA (Authentication,
Authorization & Accounting), Due Diligence, Encryption & Decryption.
 Experienced in security assessment, documentation of compliance, implementation
of controls.
 Experience with common information security management frameworks, such as ISO
2700X NIST, PCI and HIPPA.
 Experience in Network Intrusion/ Host Intrusion detection/prevention systems and
firewalls.
 Familiar with OWASP TOP 10 and SANS top 25 vulnerabilities. Knowledge on CVE & CVSS
scoring metrics.
 Experience Implementing & administering Enterprise Antivirus software (Desktop and
Server) cloud and on premises.
 Experience with HITRUST, HIPPA, PCI and IRS Pub 1075 regulation requirements and
documenting policies and procedures.
 Demonstrated ability to work within matrixed resources in a team environment. Possesses
strong organizational, time management, and diplomacy skills.
 Experience in Network Intrusion/ Host Intrusion detection/prevention systems and
firewalls.
 Experience with the process of identifying appropriate controls to comply with security
policies and regulations.
 Prior experience working with NIST compliance standards and writing security standards
 Broad experience in systems and network protocols, architecture, and infrastructure
 Prior experience remediating active intrusion
 Implement and administer OWASP vulnerability management tools, scans, reports
 Prior experience with administration, configuration, and reporting of security incident
event logging tool McAfee SIEM or Splunk.
 Experience on windows registry, Active Directory and Group Policy.
 Familiar with NIST risk management standards and PCI compliance standards.
 Familiar with Vulnerability Scanning Tools such as Tenable Cloud Scanner, Nessus.

Technical Skills:
Networking Endpoint detection and response, IDS/IPS, Security Operation Center,
Technologies Forensic analysis,
Networking Hardware Cisco Switches, Cisco Routers, Aruba Access points.
Forensic Technologies Encase, FTK Imager, Autopsy, SIFT
Security Technologies Forcepoint, Splunk, Symantec Endpoint, OWASP, Crowdstrike
Security Tools Rapid 7, Qualys, Metasploit, Nessus, Threat connect, Tenable, Nikto,
Burp Suite, Security Onion, SQL Map
SIEM Tools Splunk, TCP Dump, Suricata, BRO, Night Hawk
Network Monitoring Solar winds, Wireshark, TCP Dump, Infoblox
Operating Systems Windows, KALI LINUX, Parrot Sec
Programming Python
Languages
Firewalls ASA, Checkpoint.

Education Details:
New England College, Henniker, NH, USA March 2017 – May 2018
Master of Science in Computer Information Systems.

Certifications:
Mile2 Certified Vulnerability Assessor
ISC2 Certified In Cyber Security
Rapid7 Nexpose Certified Administrator
Qualys Certified Vulnerability Management Specialist
Fortinet Network security expert Level 1& 2.
Checkpoint (156-411) cybersecurity jumpstart certified.

Professional Experience:
TikTok, Mountain View, CA May 2022 – Present
Vulnerability Management Analyst
Responsibilities:

 Assist with planning, implementation, and maintenance of vulnerability management tools


in enterprise.
 Plan, implement, troubleshoot, and maintain technical controls, systems, policies, and
procedures for vulnerability management.
 Responsible for maintaining and improving the security posture of TikTok by identifying,
scoping, and prioritizing vulnerabilities in systems, and applications.
 Provide technical support for the resolution of vulnerabilities reported by scanners.
 Perform and control vulnerability assessments to identify control weaknesses and assess
the effectiveness of existing controls.
 Document process and practices that support vulnerability management operations.
 Assess current and emerging threats, cyberattacks, and zero-day vulnerabilities that pose
risk to TikTok.
 Analyze the vulnerability data gathered from tool and work on eliminating false positives.
 Support business units in remediating EOL vulnerabilities by providing technical guidance.
 Work with Engineering teams to integrate Vulnerability Management tools with different
connectors.
 Support remediation owners by recommending security controls and corrective actions to
mitigate vulnerability risk.
 Correlate collected intelligence to vulnerability data, to build upon a larger knowledge base
to tracked threat activity.
 Work with stakeholders, business units, and remediation owners to ensure vulnerabilities
are remediated in a timely manner to avoid SLA breaches. Advice on remediation with best
reduction and remediation practices.
 Maintain regular communication with the business units for collaboration, process
optimization, tool tuning, and information sharing.
 Develop and publish reports based on metrics, and KPIs that drive a reduction in the
vulnerability risk to the business.

Home Depot, Austin, TX August 2021 – May 2022


Staff Vulnerability Analyst
Responsibilities:

 Develop, maintain, and support Home Depot’s technical infrastructure that includes
network, hardware, systems, etc.
 Research and analyze business trends and behavioral data to identify opportunities for
improvements and new initiatives.
 Proactively create and maintain tools for monitoring and support.
 Collaborate with product and project teams to understand needs and enable them with
infrastructure.
 Develop and execute a strategy for vulnerability management and risk reduction that aligns
global best practices.
 Oversee and support the continuous improvement of the vulnerability management
program, processes, and technology integrations.
 Produce detailed reports for key stakeholders, with metrics documentation of the risk
identified and clear recommendations for remediation actions for found vulnerabilities.
 Support technical assessment of third-party vendors and provide remediation suggestions
to IT stakeholders.
 Maintain clear RACI of VM operations process and procedures.
 Obtain and maintain knowledge on existing security procedures and directives related to
vulnerability management.
 Provide direction and support of operational tools and processes for identifying and
communicating vulnerable items for vulnerability management infrastructure.

Orrba Systems LLC, Rock Hill, SC Sep 2020 – August


2021
LEAD IT Security Vulnerability Engineer

Responsibilities:

 Responsible for day-to-day operational support for the Vulnerability Management Service.
 Have good experience working towards analyzing and supporting vulnerability remediation
for endpoints.
 Working on SCCM, Tanium and similar tools.
 Providing remediation solutions for 3rd party applications vulnerabilities like java, adobe,
MS Office etc.
 Providing remediation solutions to packaging teams on vulnerabilities which may require
certain configuration changes.
 Analyze vulnerability reports to ensure data accuracy, false positive analysis, to provide
technical vulnerability analysis and determine remediation options.
 Work on categorizing the vulnerabilities based on type and provide remediation solution to
the endpoint patch management team.
 Create various scan reports for remediation and Export vulnerability data into various
reports formats required by customer.
 Help client with Vulnerability Management related questions including those related to
remediation procedures and coordinating with the client for overall vulnerability
management governance.
 Coordinate with various client support teams for queries on vulnerabilities and track
successful remediation.

Inteli Platforms, Princeton, NJ, USA April 2018 – September 2020


Sr. Information Security Analyst

Responsibilities:
 Support the evaluation, qualification, testing and delivery of security architecture
improvement, obsolescence replacement and vulnerability response projects in a multi-
tenant/requirement environment.
 Support Information Assurance (IA) data collection and continuous monitoring updates for
assigned security architectures.
 Prepare security assessment plan, secure resources, and hold kick-off meetings prior to
assessment.
 Responsible for Security Information and Event Management (SIEM), Vulnerability
Management, Incident Management & Response.
 Lead for configuring and managing Rapid 7 Nexpose tool to conduct vulnerability
management. Schedule weekly or monthly scans as requested by division agencies.
 Track emerging and ongoing cyber and physical threats using various sources. Compile and
validate data from internal, commercial, and open sources to recognize threat trends and
patterns.
 Process indicators of compromise and threat actor TTPs for correlation, detection and
alerting in appropriate security tools
 Share timely intelligence and insights with internal and external partners to enhance
situational awareness of the global threat landscape.
 Monitors all information security related systems intended to provide incident reporting or
predictive analysis of the systems.
 Documenting process to identify gaps and provide process enhancement recommendations.
 Lead role in all security and privacy compliance efforts. Compliance includes NIST, PCI, CIS
and IRS PUB-10.
 Assisted with the development, documentation, and implementation of IRS safeguards
process to ensure all controls are compatible with IRS guidelines.
 Installed, configured, and administered information security technologies intended to
protect assets from internal and external threats.
 Assists in defining, creating, and implementing banks Information Security
Policy/Standards, Guidelines.
 Responded to Information Security incidents. Responsible for Security Information and
Event Management (SIEM), Vulnerability Management, Incident Management, and
response.
 Works with auditors.
 Reviewed and approval of the system/network configuration changes, system patches and
updates according to the departments procedures.
 Reviewed compliance with the information security policy and standards. Provides periodic
reporting on information security issues and gaps
 Configured and troubleshoot McAfee ePO policies for managed systems on production
networks and provide system administrator support.
 Monitored for alerts and suspicious activity on hosts by using end point solutions like
McAfee ePo and Crowdstrike.
 Worked with open-source threat intelligence and hunt threats, analyze spam emails etc.
 Managed, monitor security tools and systems.
 Reviewed and approval of the system/network configuration changes, system patches and
updates according to the departments procedures.
 Provided high quality work ensuring accuracy and seeking to continuously improve
information security processes by embracing new and better ways of doing things.
 Execution of McAfee Policy Orchestrator and McAfee Endpoint Security Protection
enterprise suite of software.
 Responsible for implementing, configuring, and maintaining vulnerability and compliance
scanning tools such as Qualys guard, Rapid7 and Tenable.
 Conducted scheduled and ad hoc application and system scans, researching and analyzing
vulnerabilities, identifying relevant threats, corrective action recommendations,
summarizing and communicate findings effectively by using Rapid 7 InsightVM.
 Generated scheduled and ad-hoc reports for different vulnerability scans using Rapid 7
InsightVM and Tenable Nessus.
 Categorized and prioritize vulnerabilities based on MITRE ATT&CK level and recommend
remediation steps for different teams.
 Worked with Splunk enterprise to identify and address emerging security threats using
continuous monitoring, alerting, and analytics.
 Developed security processes and procedures and support service-level agreements (SLA)
to ensure that security controls are managed and maintained.
 Research, evaluate and recommend information security related hardware and software,
including developing business cases for security investments.
 Developed common set of security tools. Define operational parameters for their use and
conduct reviews of tool output.
 Developed and maintain A&A security artifacts. Analyze information gathered by the team.
 Processes both internal and external Cyber Threat Intelligence for determination of
impact, hunting to determine scope, and implementation of mitigations to defend
enterprise.
 Onboarding Threat intelligence information from multiple sources by using formats
like STIXX & TAXII, XML and Suricata/Yara alert rules.

NH State House, Concord, NH, USA October 2017 – March 2018


Information Security Analyst - Intern

Responsibilities:
 Planned and conduct continuous monitoring as recommended in the NIST 800-137
publication on all active department system.
 Will focus on Incident Response. Hunt for signs of APT activities.
 Identified security issues and risks associated with security events and manage the incident
response process.
 Participated in the incident response and investigation process for identified security
events.
 Use the Security Incident Event Management (SIEM) platform (IBM’s QRadar) to perform
Incident Response identification and response.
 Conducted scheduled and ad hoc application and system scans, researching and analyzing
vulnerabilities, identifying relevant threats, corrective action recommendations,
summarizing and communicate findings effectively by using Rapid 7 InsightVM.
 Generated scheduled and ad-hoc reports for different vulnerability scans using Rapid 7
InsightVM and Tenable Nessus.
 Performed network and system forensics in response to security incidents.
 Optimized and customize security-monitoring tools to improve detection.
 Maintained and update the security operational workflow.
 Vulnerability assessment using Tenable cloud scanner and Qualys Guard.
 Categorized vulnerabilities based on the results from tenable. Assets management using
tenable cloud scanner.
 SIEM log analysis using Splunk enterprise tools. Finding events from log sources using
Splunk.
 Provided technical expertise and security guidance for enterprise network security defense-
in-depth strategies.
 Performed Vulnerability assessment, Penetration testing, Risk Analysis and Security
assessments. Penetration testing using Metasploit, and Rapid 7.
 Assisted in security audit findings documentation, verification, and resolution to ensure that
NH State House security frameworks is in line with NIST standards.
 Documented and uploads security findings, remediation plans and exception requests as
identified by the team.
 Assisted with ongoing security projects as defined by the manager.
 Gathering threat intelligence about emerging malware using open-source threat intelligence
sources.
 Maintaining CIA (Confidentiality, Integrity, Availability).
 Intrusion monitoring using opensource tools such as BRO, Suricata, Night Hawk, Cain &
Able.
 Reviewd security events that are populated in a Security Information and Event
Management (SIEM) system.

New England College, Henniker, NH, USA March 2017 – March


2018
Graduate Teaching Assistant (Computer Security)

Responsibilities:
 Research on current and new security threats to stay informed.
 Instructs students in classroom, lab, learning center as appropriate.
 Provides student contact before or after class or through telephone or email.
 Prepares, distributes and utilizes instructional support materials, including course syllabi,
supplementary materials.
 Actively participate in the labs for threat detection modules.
 Demonstrate incident monitoring using SPLUNK enterprise and other tools in the lab.
 Demonstrate SQL Injection, Vulnerability assessment and penetration testing using open
source and enterprise tools.
 Working with KALI and Parrot Sec Linux systems in labs.
 Blocking and controlling access to social networking sites at the time of class using Cain &
Abel and other IDS/IPS tools.
 Wireshark packet capturing and analysis of packets in labs.
 Forensics evaluation demonstration using Open Source and Enterprise tools.
 Worked with Tenable cloud scanner on vulnerability assessments and categorizing them
using CVE
 Provide security awareness training on social engineering and ransomware attacks.

E2 Labs, Hyderabad, INDIA April 2014 – Dec


2016
Information Security Analyst

Responsibilities:
 Ensure proper system categorization using NIST 800-60, Implement appropriate security
controls for information system based on NIST 800-53.
 Routinely conduct security analysis and provide written and/or oral
recommendations to stakeholders.
 Monitored traffic passing through firewalls and created new policies and helped to improve
security concerns and blocked unnecessary traffic.
 Perform risk analysis and management as requested by clients.
 Analyze and investigate intrusion attempts and perform in-depth analysis of exploits.
 Creating policies using Bluecoat SG proxy. Intercepting, blocking and URL filtering using
Bluecoat proxy.
 Vulnerability Management using Qualys Guard Express and remediated vulnerabilities.
 Security awareness training for new and existing employees.
 Coordinate and manage team activities during assessment engagements.
 Establish schedules and deadlines for assessment activities.
 Threat intelligence collection using open-source networks.
 Investigate security incidents and recommend actions needed to resolve situations.
 Performing routine SQL Injection attacks and remediate them.
 Preventing Data loss by working with Symantec endpoint protection.
 Configuration and maintenance of ACL list on Aruba Access points.
 Familiar with Vulnerability Scanning Tools such as Tenable Cloud Scanner, Nessus and
analyses reports to vulnerabilities.
 Managing and providing support to various project teams with regards to the addition of
new equipment such as routers switches and firewalls to the DMZs.
 Conducted vulnerability testing using tools: Nessus, Burp suit, Tenable, and analyzed
reports.
 Conduct IT controls risk assessment to identify system threats, vulnerabilities and risk, and
generate reports.
 Developed System Security Plan to provide an over life of the system security requirements.
 Track security activities of assigned systems and brief leadership on said activities.
 Provide technical support, assisting users facing network problems. Perform advanced
troubleshooting, diagnostics and provide level-1 solutions to network failures
 Attend Security Training as requested by senior leadership.
 Develop, plan and maintain documentation necessary for operation in support of LAN to
WAN connectivity.
 Worked on bluecoat proxy to optimize WAN Performance by analyze and scan malwares to
protect the infrastructure and URL filtering

You might also like