Madhur Muskan 🇮🇳 — Associate Consultant
Results-driven SOC Analyst with over 3 years of hands-on experience in cybersecurity, excluding academic expertise gained through a master’s degree in cybersecurity. Specializes in malware analysis and incident response, with a proven track record of monitoring security events, analyzing potential threats, and implementing effective mitigation strategies. Skilled in utilizing SIEM tools and threat intelligence platforms to configure and integrate servers with SIEM systems and respond to security incidents. Possesses strong analytical abilities with in-depth knowledge of malware behavior, reverse engineering techniques, and forensic analysis. • Proficient in basic scripting using Bash and Python for automation and operational tasks. • Hands-on experience with XDR security solutions, including Trend Micro Cloud One, CrowdStrike Falcon, and VMware Carbon Black Cloud, with advanced knowledge of SIEM platforms like IBM QRadar and Splunk for security event monitoring and analysis. • Conducted Vulnerability & Risk Assessments, Red Teaming, and Penetration Testing using tools such as Nessus and RBI-governed platforms like FireCompass, BitSight, and BlackKite to identify and mitigate security risks. • Proficient in APIs, Application Security, and Testing Application security features to identify and mitigate vulnerabilities, ensuring protection against threats. • Basic understanding of security technologies such as SAST, IAST and DAST • Experienced in managing Proxy, DLP, NAC, and Imperva WAF to secure URLs, email traffic, and internet-facing applications. Skilled in Azure Firewall management for URL whitelisting and Privileged Access Management (PAM) for AWS and on-premises servers. Proficient in deploying Trend Micro, DAM, and Syslog agents for log forwarding and centralized SIEM monitoring, with expertise in Database Activity Monitoring (DAM) to secure sensitive data activities. • In-depth understanding of OWASP Top 10 vulnerabilities, MITRE ATT&CK Framework, Cyber Kill Chain, Threat Intelligence, Threat Hunting, Incident Response (IR), Advanced Persistent Threats (APT), TTPs (Tactics, Techniques, and Procedures), and Indicators of Compromise (IoCs) for effective threat detection and mitigation. • Strong expertise in Code Analysis, Malware Analysis, Behavior Analysis, and Reverse Engineering to understand malicious activity and develop countermeasures.
Stackforce AI infers this person is a Cybersecurity Analyst with expertise in threat detection and incident response.
Location: Bengaluru, Karnataka, India
Experience: 3 yrs 6 mos
Skills
- Threat Detection
- Vulnerability Assessment
- Vulnerability Management
- Incident Response
Career Highlights
- Over 3 years of hands-on experience in cybersecurity.
- Specializes in malware analysis and incident response.
- Proficient in utilizing SIEM tools for security monitoring.
Work Experience
Deloitte
Assistant Manager (7 mos)
Aujas Cybersecurity
Associate Consultant (3 yrs)
Terralogic Inc.
Cyber Security Analyst (5 mos)
Education
Master in cyber security and digital forensic at Rashtriya Raksha University, India
Bachelor of science at Jharkhand Raksha Shakti University