S

Sudhir Kumar Goswami

Associate Partner

Prague, Czechia12 yrs 7 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Over 8 years of experience in CyberSecurity.
  • Expert in SIEM and CyberSecurity UseCase Creation.
  • Strong background in compliance and risk management.
Stackforce AI infers this person is a CyberSecurity expert with a focus on SIEM and compliance in enterprise environments.

Contact

Skills

Core Skills

SiemCybersecurityComplianceResearch

Other Skills

AWSBig Data Platform HadoopCloud SecurityCyberSecurity ResearchCyberSecurity UseCase CreationData source TroubleshootingDataSource OnboardingDigital ForensicsEthical HackingIncident ResponseInformation SecurityNetwork SecurityPrivacy and Data ProtectionRisk AnalysisRisk Assessment and Management

About

Sudhir kumar is CyberSecurity (InfoSec) Evangelist and currently working as CyberSecurity Engineering & Development Specialist/Lead on Security Information & Event Management (SIEM) domain for CyberSecurity Engineering Team at Managed Security Services (MSS) at level 9 in Accenture Security. Also holds special interest in the Compliance, Management and technical aspect of CyberSecurity and SOAR. Computer & Science Engineering. GATE Qualified. Master Student of CyberSecurity. Specialties: Cyber Engineering SIEM ADMIN CyberSecurity UseCase Creation SIEM Platform End to End Management SOAR PCI DSS Cryptography ESRM MSS SIEM Big Data in CyberSecurity SOC IAM GRC EVM PKI Tools InfoSec Tools Privacy and Data Protection ISO 27001 Digital Forensic & Fraud Management Risk Assessment and Management OWASP TOP 10 Vulnerability Cloud Security Information Security Management System Reverse Engineering Information Security Governance Vulnerability Assessment and Penetration Testing (VAPT) COBIT IT Audit BCP DRP

Experience

Accenture czech republic

5 roles

CyberSecurity Engineering Associate Manager

Promoted

Dec 2023Present · 2 yrs 3 mos

  • Part of Accenture for more than 8 years at Cyber Fusion Center (Accenture CFC) in Prague, Czech Republic enabling enterprises for cyberdefense.

CyberSecurity Engineering & Development Specialist

Dec 2022Nov 2023 · 11 mos

  • Working with Accenture around for 6 years in Cyber Fusion Center (Accenture CFC) in Prague, Czech Republic. Being part of Cyber Defense Team for CyberSecurity engineering role performing SIEM Administrator task. UseCase Creation for CyberOps Team. SOAR Admin Tasks. SIEM platform management end to end. Onboarding of New security tools and devices.
  • CyberUse Cases Creation/Tuning, DataSource Onboarding, Mapping and Parsing, BAS Activity Validation, Purple Activity Validation SIEM Management.
  • Also working on for CyberSecurity UseCase Creation on :
  • IoT Security (Internet of Things)
  • OT Security (Operational Technology)
  • IoMT Security (Internet of Medical Things)
  • ICS Security (Industrial Control System)
SIEM AdministrationCyberSecurity UseCase CreationSOAR AdministrationDataSource OnboardingSIEMCyberSecurity

CyberSecurity Engineering & Development Lead

Promoted

Dec 2020Dec 2022 · 2 yrs

  • Associated with Accenture Security around 5 years and now designated at Level 9 as CyberSecurity Engineering & Development Specialist.
  • Currently Part of CyberSecurity Engineering Team handling SIEM Admin Task using Securonix, SNYPR Data Lake, Big Data Platform Hadoop supported by Cloudera for Data source Troubleshooting.
  • Tools and Device Integration, SIEM Platform Handling, UseCase Creation.
  • Newly Data source Onboarding and Continuous tuning of existing datasources.
  • RegEx Writing for new event type and parser creation of various datasources.
  • Define & Building SIEM custom use cases, content development for various data source.
  • Finetuning of the existing Use cases to reduce false positive and noise.
  • Parsing, mapping and remapping of the attributes.
  • Checking Health check of Hadoop HDFS nodes for memory, cpu, disk utilization for smooth functioning.
  • DR Implementation for Various datasources.
  • Playbook Creation using SOAR.
  • Playbook monitoring and troubleshooting for smooth functioning.
  • RIN (Remote Ingestion Node) and syslog servers monitoring and implementing configuration for datasources.
  • Configuring and updating the SYSLOG server for receiving the logs and forwarding the logs to various SOLR cell using SYSLOG NG config files.
  • Creating Threat Models.
  • Working within current change management processes to apply patches and provide first-line support for supported security tools.
  • Feed intelligence and indicators of compromise to security incident management during P1 and P2 incidents to support the incident management process via triage on security events.
  • Produced actionable intelligence for colleagues and business areas in the form of threat advisories, briefings, a threat attribution database and tactical data feeds.
  • Provided technical governance, oversight and direction for the overall security service, solution design and implementation compatible with the target state operational security architecture.
  • SNYPR Datalake, FortiSOAR, Cloudera, Apache Spark jobs
SecuronixBig Data Platform HadoopData source TroubleshootingUseCase CreationSIEMCyberSecurity

CyberSecurity Senior Development Engineer

Promoted

Apr 2019Dec 2020 · 1 yr 8 mos

  • Currently Part of CyberSecurity Engineering Team handling Admin Task using Securonix, SNYPR Data Lake, Big Data Platform Hadoop supported by Cloudera and various data sources for Data source Troubleshooting, Data source Onboarding, RegEx Writing, Define & Building SIEM custom use cases, content development for various data source, Finetuning of the existing Use cases to reduce false positive and noise. Parsing, mapping and remapping of the attributes. Checking Health check of Hadoop HDFS nodes for memory, cpu, disk utilization for smooth functioning. Cofniguring and updating the SYSLOG server for receiving the logs and forwarding the logs to various SOLR cell using SYSLOG NG config files.
  • Creating Threat Models.
  • Using following Hadoop Component:
  • HDFS
  • SOLR
  • SPARK (12 Jobs)
  • Zookeeper
  • HBase
  • YARN
  • HIVE
  • IMPALA
  • KAFKA
  • Sentry
  • Hue
  • Oozie
SecuronixBig Data Platform HadoopData source TroubleshootingUseCase CreationSIEMCyberSecurity

CyberSecurity Delivery Senior Analyst

Nov 2017Aug 2019 · 1 yr 9 mos

  • I was part of Cyber L2 Team for Securonix SIEM Team handling below tasks using SNYPR tool with multiple native tools for investigation.
  • Fine tuning suggestion
  • Working on Top violators, violations and multiple Threat Models to capture high severity violators.
  • handling Client call and expectation
  • Weekly, monthly Report Preparation
  • Handling multiple High priority P1 and P2 issues
  • Datasource health check report preparation
  • Dashboard creation in SNYPR
  • KT to Team and junior resource
  • Brown Bag session to team as in when required for new cyber threats.
  • Preparing Baseline Report for Clients.
  • Directly Investigating with the users for Audit Frameworks like GDPR, HIPAA, PCI DSS etc and taking it to resolution.
  • Also Handled Splunk Admin Task in previous project in Accenture for Handling Splunk components like Search Head, Deployment server, Forwarders, License Master, Indexers etc for SIEM functioning, Define & Building SIEM custom use cases, Full platform support to Splunk v6.4.2 solutions, Splunk health monitoring and maintaining.
  • Managed Splunk configuration files like indexes.conf, inputs.conf, outputs.conf, props.conf, savedsearches.conf etc.
  • Experience with monitoring and operating SIEM, EDR and IDS/IPS solutions alongside other critical monitoring toolsets.
  • Experience with Incident Response methodology in investigations, and the groups behind targeted attacks and tactics, techniques, and procedures (TTPs).
  • Monitoring security devices for server and workstation in various sites across globe and Routinely assess vulnerabilities and coordinating with security specialist. Routinely monitor and analyze network traffic and system performance. Also handling below tools.
  • Splunk
  • Securonix SNYPR
  • FireEye HX & NX
  • Tanium
  • Cybereason (EDR)
  • Airwatch
  • Infoblox IPAM
  • Alcatel-Lucent VitalQIP DNS/DHCP IPAM
  • Palo Alto Network (PAN) Firewall
  • PAN MineMeld
  • iDefense® Security Intelligence
  • Amazon Web Services (AWS)
  • RSA Archer for Ticket Management
  • Service Now
SecuronixSplunkIncident ResponseVulnerability AssessmentSIEMCyberSecurity

Tata consultancy services

CyberSecurity Senior Analyst

Dec 2015Nov 2017 · 1 yr 11 mos · Bengaluru Area, India

  • I was working as L2 level Security Analyst for Security operations Center (SOC) domain with Security Information & Event Management (SIEM) at Cyber Security Practice, TCS in Enterprise Security & Risk Management (ESRM).
  • Tool Knowledge:-
  • SIEM (Splunk)
  • Skybox Security
  • BlueCoat
  • McAfee ePO
  • VMS Tripwire 360 nCircle
  • Juniper Firewall SRX
  • Cisco IronPort
  • Cisco Meraki
  • Juniper IDP
  • Snow Software: Software Asset Management (SAM)
  • Security Exception Tool
  • My Responsibility includes :-
  • Firewall Approval/Rejection
  • Manage security incidents and thereby minimizing the Number and Severity of Security Incidents.
  • Analyze and develop new technologies for minimizing security vulnerabilities and risks
  • Provide security consulting services.
  • Routinely assess vulnerabilities and coordinating with security specialist
  • Routinely monitor and analyze network traffic and system performance.
  • Responsible for analysis and reporting
  • Learn about new vulnerabilities and attack strategies employed by attackers.
  • Monitor firewall, IronPort and IDP logs.
  • Threat and vulnerability detection.
  • Handling SOC operations vulnerability assessment tools
  • Involved in risk analysis of major threats and vulnerabilities detected at client’s network.
  • Monitoring of Multiple Security Incidents using SIEM tool (Splunk).
  • Analyzing the offenses for Botnet, P2P activity, Virus threat, Trojan, Malwares, Brute force attack, vulnerability and policy violation activities.
  • All security events, network transactions and additional contextual information (derived from correlation tests) observed during an attack or violation.
  • Identify anomalies and possible threats or to review network usage and performance to help meet IT service-level responsibilities.
  • Finding out the false positive/negative offenses, modifying the rules to ignore the legitimate traffic and reducing the offense count.
  • Search across logs on different nodes and time periods based on specific criteria.
SIEMSecurity Operations CenterVulnerability AssessmentRisk AnalysisCyberSecurity

Jumbo systems & solutions pvt. ltd

Cyber Security Consultant

Jun 2015Nov 2015 · 5 mos · Navi Mumbai Area, India

  • I was working as Security Consultant for auditing Security framework like PCI DSS, ISMS, HIPAA, and COBIT. I have handled AWS and Non AWS infrastructured clients both auditing PCI DSS.
  • My responsibilities include following.
  • Scoping
  • Gap Assessment
  • Gap Assessment Report Writing
  • Provide full Remediation
  • Configuration Check
  • Evidence Collection
  • ROC Preparation
  • Policy Preparation
  • Procedure Preparation
  • Forms Preparation
  • Business Development
  • Tool Knowledge:-
  • AWS Infrastructure
  • Ossec
  • Snort
  • CryptDB
AWSSecurity AuditsVulnerability AssessmentRisk ManagementCyberSecurityCompliance

Defense institute of advanced technology (diat), du, drdo

CyberSecurity Researcher

Jul 2013Jun 2015 · 1 yr 11 mos · Pune Area, India

  • CyberSecurity Researcher,
  • Ethical Hacking,
  • Digital Forensic,
  • Network Security,
  • Information Security,
  • Business Continuity Plan,
  • Disaster Recovery Plan,
  • Risk Assessment,
  • Backdoor OS,
  • Kali Linux OS,
  • Metasploit,
  • VAPT,
  • Footprinting and Reconnaissance tools practical,
  • Scanning Networks,
  • Enumeration,
  • System Hacking,
  • Trojans and Backdoors,
  • Viruses and Worms,
  • Sniffing ,
  • Social Engineering,
  • Denial of Service,
  • Session Hijacking,
  • SQL Injection,
  • Hacking Wireless Networks,
  • Hacking Mobile Platforms,
  • Evading IDS,
  • Firewalls and Honeypots,
  • Buffer Overflows,
  • Cryptography,
  • Penetration Testing,
  • Risk Management,
  • Security Audits,
CyberSecurity ResearchEthical HackingDigital ForensicsNetwork SecurityCyberSecurityResearch

Bharat sanchar nigam limited

Engineering Intern Student

Apr 2011May 2011 · 1 mo · Patna Area, India

  • Mobile Communications :- CDMA and GSM
  • 2G, Edge Infrastructure
  • Networking Concepts
  • Broadband Technologies
  • PCM Principles
  • Fibre optic Technology
  • Introduction - Digital Switches
  • Internet & Email – Visit to NIB
  • GSM
  • Intelligent Networks
  • Latest trends in Communication
  • Broadband Multiplay Lab
  • BSNL Museum
  • Telecom Power Plant
  • Latest BSNL Products

Education

Defence Institute of Advanced Technology (DIAT), DU, DRDO

Master of Technology (M. Tech.) — Cyber/Computer Forensics and Counterterrorism

Jan 2013Jan 2015

Cochin University of Science and Technology

Bachelor of Technology (B.Tech.) — Computer Science & Engineering

Jan 2009Jan 2013

Cochin University of Science and Technology

Certificate Examination in French — French Studies

Jan 2010Jan 2011

S.S College Jehanabad

Intermediate Science — Mathematics and Science

Jan 2006Jan 2008

High School Tehta

High School — Advanced Mathematics

Jan 2005Jan 2006

Stackforce found 100+ more professionals with Siem & Cybersecurity

Explore similar profiles based on matching skills and experience