Madhur Muskan 🇮🇳

Associate Consultant

Bengaluru, Karnataka, India3 yrs 6 mos experience
Highly Stable

Key Highlights

  • Over 3 years of hands-on experience in cybersecurity.
  • Specializes in malware analysis and incident response.
  • Proficient in utilizing SIEM tools for security monitoring.
Stackforce AI infers this person is a Cybersecurity Analyst with expertise in threat detection and incident response.

Contact

Skills

Core Skills

Threat DetectionVulnerability AssessmentVulnerability ManagementIncident Response

Other Skills

AWS SecurityAmazon EC2Amazon RedshiftAmazon S3Amazon VPCAmazon Web Services (AWS)AntivirusAutopsyAzure FirewallAzure Infrastructure as a Service (IaaS)Azure SentinelBitSightBlackKiteBurp SuiteCode Analysis

About

Results-driven SOC Analyst with over 3 years of hands-on experience in cybersecurity, excluding academic expertise gained through a master’s degree in cybersecurity. Specializes in malware analysis and incident response, with a proven track record of monitoring security events, analyzing potential threats, and implementing effective mitigation strategies. Skilled in utilizing SIEM tools and threat intelligence platforms to configure and integrate servers with SIEM systems and respond to security incidents. Possesses strong analytical abilities with in-depth knowledge of malware behavior, reverse engineering techniques, and forensic analysis. • Proficient in basic scripting using Bash and Python for automation and operational tasks. • Hands-on experience with XDR security solutions, including Trend Micro Cloud One, CrowdStrike Falcon, and VMware Carbon Black Cloud, with advanced knowledge of SIEM platforms like IBM QRadar and Splunk for security event monitoring and analysis. • Conducted Vulnerability & Risk Assessments, Red Teaming, and Penetration Testing using tools such as Nessus and RBI-governed platforms like FireCompass, BitSight, and BlackKite to identify and mitigate security risks. • Proficient in APIs, Application Security, and Testing Application security features to identify and mitigate vulnerabilities, ensuring protection against threats. • Basic understanding of security technologies such as SAST, IAST and DAST • Experienced in managing Proxy, DLP, NAC, and Imperva WAF to secure URLs, email traffic, and internet-facing applications. Skilled in Azure Firewall management for URL whitelisting and Privileged Access Management (PAM) for AWS and on-premises servers. Proficient in deploying Trend Micro, DAM, and Syslog agents for log forwarding and centralized SIEM monitoring, with expertise in Database Activity Monitoring (DAM) to secure sensitive data activities. • In-depth understanding of OWASP Top 10 vulnerabilities, MITRE ATT&CK Framework, Cyber Kill Chain, Threat Intelligence, Threat Hunting, Incident Response (IR), Advanced Persistent Threats (APT), TTPs (Tactics, Techniques, and Procedures), and Indicators of Compromise (IoCs) for effective threat detection and mitigation. • Strong expertise in Code Analysis, Malware Analysis, Behavior Analysis, and Reverse Engineering to understand malicious activity and develop countermeasures.

Experience

Deloitte

Assistant Manager

Aug 2025 – Present · 7 mos · Bengaluru, Karnataka, India · Hybrid

Aujas cybersecurity

Associate Consultant

Sep 2022 – Sep 2025 · 3 yrs · Bengaluru, Karnataka, India · On-site

  • Skilled in MITRE ATT&CK, OWASP Top 10, Cyber Kill Chain, APTs, TTPs & IoC management.
  • Expertise in Code Analysis, Malware Behavior analysis, and Reverse Engineering for threat mitigation.
  • Experienced in installing, managing, and deploying security agents across on-prem and (AWS) cloud servers, for SIEM monitoring, log forwarding, and enhanced security visibility.
  • Project 1: Security Operations & Threat Detection (Banking Sector)
  • Expertise in Trend Micro Cloud One, CrowdStrike Falcon, and IBM QRadar for threat detection and IoC blocking across security solutions.
  • Conducted VAPT, Red Teaming, and Risk Assessments using Nessus, FireCompass, BitSight, and BlackKite to identify and mitigate security risks.
  • Experienced in managing security solutions such as Proxy, DLP, and NAC to secure URLs and email traffic.
  • Expertise in managing PAM solutions to secure privileged accounts and enforce access controls.
  • Hands-on experience with Imperva WAF for protecting internet-facing applications.
  • Project 2: Security Infrastructure & Risk Management
  • Azure Firewall: URL whitelisting and traffic filtering
  • Microsoft Defender & VMware Carbon Black Cloud XDR for endpoint protection
  • IoC blocking based on threat intelligence and advisories
  • Vulnerability Management: Performed Nessus scans in alignment with threat advisories to identify and remediate security gaps.
MITRE ATT&CKOWASP Top 10Cyber Kill ChainCode AnalysisMalware Behavior analysisReverse Engineering+18

Terralogic inc.

Cyber Security Analyst

Mar 2022 – Aug 2022 · 5 mos · Bengaluru, Karnataka, India

  • Conducted ransomware analysis, identifying attack vectors, payload behavior, and mitigation strategies.
  • Worked with LogRhythm SIEM tools, UEBA, and SOAR to automate threat detection and response.
  • Managed Endpoint Detection & Response (EDR) tools (Cylance, Kaspersky) to analyze and remediate threats.
  • Performed Vulnerability Assessments using Nmap, Metasploit, Nessus, and Burp Suite.
  • Created comprehensive VAPT reports with detailed risk scoring and actionable remediation strategies.
Ransomware analysisLogRhythm SIEMUEBASOAREndpoint Detection & ResponseVulnerability Assessments+6

Education

Rashtriya Raksha University, India

Master in cyber security and digital forensic — Cyber Security

Jan 2020 – Jan 2022

Jharkhand Raksha Shakti University

Bachelor of science

Jan 2017 – Jan 2020

Stackforce found 100+ more professionals with Threat Detection & Vulnerability Assessment

Explore similar profiles based on matching skills and experience