Krishnakumar K.A

CEO

Bengaluru, Karnataka, India17 yrs experience
Most Likely To SwitchAI Enabled

Key Highlights

  • Over 15 years of global cybersecurity experience
  • Expert in incident response and threat detection
  • Proven success in enhancing organizational cyber resilience
Stackforce AI infers this person is a cybersecurity expert with extensive experience in finance and consulting sectors.

Contact

Skills

Core Skills

Incident ResponseCybersecurity OperationsSecurity OperationsCyber Threat HuntingDigital Forensics

Other Skills

AWS SecurityAmazon Web Services (AWS)Artificial IntelligenceArtificial Intelligence (AI)Cloud SecurityCyber Threat Hunting (CTH)Cyber Threat Intelligence (CTI)DFIREDR solutionsEmail SecurityEmployee TrainingEnCaseGoogle Cloud Platform (GCP)MDIMalware Analysis

About

A cybersecurity expert with over 15 years of global experience in cyber security operations, incident response, threat detection, digital forensics, malware analysis and cloud security. Focused on elevating enterprise security operations through incident response, SOAR automation, third-party breach management, implementing advanced SIEM integrations and zero-trust architectures. Demonstrated expertise in mentoring teams, enhancing security postures, and driving technical improvements to reduce organizational risk. Proven success in leading high-performance teams, implementing strategic security initiatives, and enhancing organizational cyber resilience across financial, consulting, and media sectors. Passionate about optimizing cyber defense strategies to align business objectives with regulatory compliance. ๐—–๐—˜๐—ฅ๐—ง๐—œ๐—™๐—œ๐—–๐—”๐—ง๐—œ๐—ข๐—ก๐—ฆ ย ย โ€ข CISSP ย ย โ€ข GREM ย ย โ€ข GCFA ย ย โ€ข GCIA ย ย โ€ข OSCP ย ย โ€ข Microsoft Certified: Azure Fundamentals ย ย โ€ข SimSpace Certified Cyber Range Associate ๐—›๐—”๐—ก๐——๐—ฆ ๐—ข๐—ก ๐—ง๐—ข๐—ข๐—Ÿ๐—ฆ ย ย โ€ข ๐—™๐—ผ๐—ฟ๐—ฒ๐—ป๐˜€๐—ถ๐—ฐ๐˜€: EnCase, Volatility, Sleuth Kit, AXIOM, SIFT ย ย โ€ข ๐— ๐—ฎ๐—น๐˜„๐—ฎ๐—ฟ๐—ฒ ๐—”๐—ป๐—ฎ๐—น๐˜†๐˜€๐—ถ๐˜€/๐—ฅ๐—ฒ๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ฒ ๐—˜๐—ป๐—ด๐—ถ๐—ป๐—ฒ๐—ฒ๐—ฟ๐—ถ๐—ป๐—ด: FlareVM, Ghidra, x64dbg, REMnux, OLETools ย ย โ€ข ๐—˜๐——๐—ฅ: CrowdStrike, Carbon Black, Microsoft Defender, Tanium ย ย โ€ข ๐—–๐—น๐—ผ๐˜‚๐—ฑ: AWS, Azure | Security Tools: Prisma, Wiz ย ย โ€ข ๐—”๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: XSOAR ย ย โ€ข ๐—”๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ถ๐—ฎ๐—น ๐—œ๐—ป๐˜๐—ฒ๐—น๐—น๐—ถ๐—ด๐—ฒ๐—ป๐—ฐ๐—ฒ: Microsoft Security Copilot, Github Copilot ย ย โ€ข ๐—ฆ๐—œ๐—˜๐—  ๐—ง๐—ผ๐—ผ๐—น๐˜€: ArcSight, Splunk, RSA Security Analytics, Securonix, ELK-Kibana ย ย โ€ข ๐—ฃ๐—ฎ๐—ฐ๐—ธ๐—ฒ๐˜ ๐—”๐—ป๐—ฎ๐—น๐˜†๐˜€๐—ถ๐˜€: Wireshark, T Shark ย ย โ€ข ๐—˜๐—บ๐—ฎ๐—ถ๐—น ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜†: FireEye, Proofpoint, Ironport ย ย โ€ข ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜†: Bluecoat Proxy,Tipping Point IDS, Netskope, Akamai, Shape ย ย โ€ข ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—™๐—ฟ๐—ฎ๐—บ๐—ฒ๐˜„๐—ผ๐—ฟ๐—ธ ๐—ž๐—ป๐—ผ๐˜„๐—น๐—ฒ๐—ฑ๐—ด๐—ฒ: NIST, ISO 27001, STRIDE

Experience

Morgan stanley

Vice President

Jan 2023 โ€“ Present ยท 3 yrs 2 mos

  • Managed and mentored a team of Triage Analysts at Morgan Stanley, focusing on performance evaluation, training, and technical improvement.
  • Led incident response efforts for priority incidents, 3rd party breaches, and vulnerabilities, ensuring effective resolution and mitigation.
  • Led investigations on incidents happening on cloud and on-prem infrastructure. Participated in stakeholder briefs.
  • Spearheaded cyber security projects on soar automation, tool onboarding, and security posture reviews, enhancing overall security measures.
  • Led the Global Forensic initiatives, introduced new tool sets and refined forensic processes. Boosted the response time for forensic investigations.
  • Managed post-acquisition security posture reviews and compliance readiness.
  • Refined the documentation governance by adding proper documentation life cycle and aligned them with NIST, MITRE ATT&CK frameworks.
  • Conducted executive presentations, tabletop exercises, and training sessions on digital forensics and malware reverse engineering.
xsoarreverse engineering malwareGoogle Cloud Platform (GCP)Team LeadershipPublic SpeakingArtificial Intelligence (AI)+7

Zee entertainment enterprises limited

Senior Manager Information Security

Mar 2022 โ€“ Jan 2023 ยท 10 mos ยท Bengaluru, Karnataka, India

  • รž Managing and mentoring the newly formed Security Operations Team for the firm.
  • รž Integrated diverse log sources into SIEM platform to improve threat visibility and detection.
  • รž Implemented zero trust for Proxy and VPN, tested and deployed Cortex XDR.
  • รž Designed incident response playbooks and onboarding frameworks for new tools.
  • รž Collaborated with engineering and IT teams to define security use cases.
Security OperationsIncident ResponseSecurity Operations CenterSecurity Information and Event Management (SIEM)Digital ForensicsAWS Security+3

Ernst & young global consulting services

Supervising Associate

May 2020 โ€“ Mar 2022 ยท 1 yr 10 mos

  • รž Triage security events and carry out incident response steps. Investigate incidents on on-premises infrastructure and Azure cloud infrastructure.
  • รž Facilitate static and dynamic malware analysis on endpoints with proper
  • documentation and steps for remediation of infected systems.
  • รž Proactively hunt for and investigate potential malicious activity and incidents across
  • multiple platforms using EDR solutions and SIEMs.
  • รž Collaborating with other enterprise cyber security teams like Threat Intel, Hunt, and
  • Threat Detection.
  • รž Create/improve playbooks and procedures.
  • รž Managing and mentoring a team of L2/L3 analysts.
SplunkSecurity OperationsIncident ResponseSecurity Operations CenterSecurity Information and Event Management (SIEM)Digital Forensics+6

Morgan stanley

Manager (Associate)

Dec 2016 โ€“ May 2020 ยท 3 yrs 5 mos ยท Bengaluru Area, India

  • รž Triage security events and carry out incident response steps.
  • รž Conduct senior level log analysis, proactive monitoring, mitigation, and response to
  • network and security incidents.
  • รž Perform static and dynamic malware analysis on virtual servers with proper
  • documentation and steps for removal on infected systems.
  • รž Host/Memory analysis using SIFT, Encase, Volatility, Magnet AXIOM, FTK imager,
  • Sleuth Kit etc.
  • รž Proactively hunt for and investigate potential malicious activity and incidents across
  • multiple platforms using EDR solutions and SIEMs.
  • รž Researching on advance threat actors and implementing controls in the organization.
  • รž Detect and respond Spear phishing, phishing campaigns and targeted attacks.
  • รž Collaborating with other enterprise cyber security teams like Threat Intel, Hunt, CA etc.
  • รž Creating/improving playbooks and procedures, conduct training for SOC and CIRT.
SplunkSecurity OperationsIncident ResponseSecurity Operations CenterSecurity Information and Event Management (SIEM)EnCase+5

Wells fargo

Technology Specialist

Jan 2014 โ€“ Dec 2016 ยท 2 yrs 11 mos ยท Bengaluru Area, India

  • รž Working as a L3 Technology Specialist in information security.
  • รž Detect and respond to IT security incidents using ArcSight and other tools.
  • รž Provide day-to-day support to Incident Response/Management.
  • รž Supporting the establishment, enhancement, and continual improvement of an integrated set of correlation rules, alerts, searches, reports, and responses.
  • รž Analyzing event flow of various devices using rules, reports, dashboards, query viewers, active channels etc.
  • รž Provide optimization of data flow in agents using aggregation, filters, etc.
  • รž Integrating third party utilities to arcsight integration commands and tools to ease the event analysis.
  • รž Conducting event collection, log management, and event management with Arcsight loggers.
  • รž Tunes ArcSight performance and event data quality to maximized ArcSight system efficiency.
  • รž Installation and troubleshooting of Arcsight smart connectors and flex connectors.
  • รž Analyzing intrusion events using Tipping Point IDS and Deadend.
  • รž Monitoring DDOS traffic using Netflow.
  • รž Malware analysis using malware sandbox Fire eye, Looking glass and Tanium.
  • รž Working closely with forensic team to mitigate malware outbreaks.
  • รž Performing virus, malware, spam and phishing filtering in e-mails.
  • รž Creating Daily, Weekly and Monthly status reports and trend reports for various devices.
SplunkSecurity OperationsIncident ResponseSecurity Operations CenterSecurity Information and Event Management (SIEM)Digital Forensics+1

Wipro technologies

Senior Secuirty Analyst

Sep 2011 โ€“ Oct 2013 ยท 2 yrs 1 mo

  • รž Worked as a Senior Security Analyst for global clients, US Bank, TJ Max and Arcelormittal.
  • รž Led a Secmon team of 6 members, for a US based client.
  • รž Detect and respond to IT security incidents using ArcSight and other tools.
  • รž Provide day-to-day support to Incident Response/Management.
  • รž Analyzing event flow of various devices using rules, reports, dashboards, query viewers, active channels etc.
  • รž Working on Arcsight content development.
  • รž Analyzing intrusion events using SourceFire IDS or Mcafee NSM.
  • รž Monitoring DDOS traffic using Arbor.
  • รž Analyzing vulnerability reports from VA tools like Nessus.
  • รž Malware analysis using malware detector tool Fire eye.
  • รž E-mail security monitoring using the appliance Cisco IronPort.
  • รž Doing content filtration, blocking spoofed E-mails. Implementing whitelisting or blacklisting for various incoming or outgoing mail domains. Performing virus, spam filtering in e-mails.
  • รž Analyzing E-mail flow.
  • รž Creating Daily, Weekly and Monthly status reports and trend reports for various devices.
  • รž Leading and coordinating weekly meeting with client and discuss about issues, challenges, escalations, process changes etc.
  • รž Conducting training sessions on SIEM, Log analysis, Network administration, etc for new joiners on Wipro ESS division.
Security OperationsIncident ResponseSecurity Operations CenterSecurity Information and Event Management (SIEM)Team Management

Paladion networks

IT Security Engineer

Jun 2010 โ€“ Sep 2011 ยท 1 yr 3 mos

  • Paladion is a global full service managed security provider committed to delivering technology solutions to ensure impenetrable security to 400+ clients in 15 countries across Asia, US and Europe.
  • Support: Paladion Security Operations Centre
  • Project: India ArcSight Team
  • My roles and Responsibilities
  • Working as a Security Analyst based on the tool ArcSight.
  • Responsible for providing security support for distributed computer systems
  • Handles all end users report Incidents, Problem Tickets and Change management tickets with respect to Network Security within the agreed SLA.
  • Analyses security incidents as well as liaise with clients on security instructions.
  • Working on various Routers, Switches, Firewalls and other network devices.
  • Reporting device or interface down events to maintain maximum uptime.
  • Log correlation and real time threat management using ArcSight.
  • Creating Rules, Active channels, Dashboard, Filters, Reports and Queries in Arcsight to track incidents.
  • Worked with ArcSight administrator to develop ArcSight rules, channels, and analysis methodology.
  • Creating Daily and Monthly reports and Adhoc reports of various devices for different clients.
  • Maintaining Archsight servers, by filtering noisy events, creating daily and weekly backups.
Security OperationsSecurity Operations CenterSecurity Information and Event Management (SIEM)

Religare technologies it services ltd

Network Engineer

Dec 2008 โ€“ Jun 2010 ยท 1 yr 6 mos

  • Religare Technova Limited is the holding company for the IT business of a large diversified Indian transnational business group. The group pursues aggressive business interests globally in Financial Services, Health Care, Wellness, Diagnostics and Aviation and Travel.
  • Support: Religare Enterprise Level Support,
  • (Support All Religare Wellness Employees and Clients)
  • My roles and Responsibilities
  • L1 &L2 Network support
  • Configuring Network and Systems for connectivity
  • Creating and managing VLANs
  • Implementing port security for switches
  • Monitoring network and responding to outages with the help of Whats up Gold.
  • Creating and managing firewall rules.
  • Implementing and supporting network for the clients.
  • Administration of Servers which include multiple platforms like Windows and Linux in the Bangalore office and other offices of the company
  • Creating and Managing users and groups
  • Creating and Managing DHCP Scopes
  • Maintain maximum uptime of Servers
  • Managing, creating E-mail accounts in Mail Server (Zimbra).
  • Maintain inventory of IT assets of the company.

Education

University of Kerala

B-Tech โ€” Electronics and Communication

Jan 2002 โ€“ Jan 2006

Tech

Bachelor of Technology (B; Degree โ€” Electronics and Communication

Stackforce found 100+ more professionals with Incident Response & Cybersecurity Operations

Explore similar profiles based on matching skills and experience