N

Nilesh Lulle

Product Engineer

Bengaluru, Karnataka, India11 yrs 4 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Expert in managing DDoS attacks and incident response.
  • Proficient in threat intelligence and vulnerability management.
  • Strong experience with SIEM tools and digital forensics.
Stackforce AI infers this person is a Cybersecurity expert specializing in threat intelligence and incident response.

Contact

Skills

Core Skills

Threat IntelligenceIncident ResponseMalware AnalysisSiemDdos MitigationFirewall Management

Other Skills

AIAI in CybersecurityAnalytical SkillsArcSightAttack Surface ManagementBMC RemedyBitSightBrand ProtectionCCheckpointCommunicationConfluenceCyber Defence ConceptCyber Threat Intelligence (CTI)Dark Web

About

A security enthusiast having experience in managing and finding solution for DDoS attacks , SIEM tools, Firewalls for clients across multiple industry verticals and geographies. • DDOS: Arbor Platform • IR: Arcsight Platform • IPS: Device Upgrade, Signature Update • Firewalls: Basic knowledge on Checkpoint, Cisco ASA • FireEye EX: Blocking and allowing malicious emails • Vulnerability Management • Malware Analysis • Digital Forensics • Incident Response • Threat Hunting

Experience

Kimberly-clark

Cyber Threat Investigator

Jul 2020Present · 5 yrs 8 mos · Bengaluru, Karnataka, India

  • Managing Threat Intelligence team to ensure real-time intelligence (Tactical, Operational, Strategic) and proactively hunting for internal threats using OSINT.
  • Working collaboratively with IR team to direct response to security incidents and adherence to procedures for security alerting and investigations.
  • Accountable for the vulnerability identification, assessment, and remediation for the organization infrastructure both OT and SAP.
  • Demonstrating GenAI (Google Gemini and STRIDE GPT) Usage in Threat Intelligence and Threat Hunting to empower cybersecurity with power of AI.
  • Extracting intelligence from phishing and malware campaigns, exploited vulnerabilities, retail and hospitality sector threats, supply chain attacks, and data breaches.
  • Exemplified experience with APIs for automating the collection of threat intelligence.
  • Leading brand protection initiatives to prevent account takeovers, fake accounts, spoofed domains, and scams exploiting brand logos and messaging. Utilized advanced AI and automated takedowns to safeguard brand reputation and customer trust.
  • Implementation of BitSight and Onapsis landscape with SAML, SMTP, Splunk and with RSA archer for auto incident creation.
  • Leveraged Anomali to aggregate and analyze threat intelligence from diverse sources, identifying actionable insights from open-source intelligence, commercial feeds, and internal data.
  • Utilized Mandiant Threat intelligence and Dark Web module to identify and analyze external surface assets, uncovering vulnerabilities, misconfigurations, and exposures; prioritized remediation efforts based on risk assessment to enhance organizational security posture.
  • Developed and managing the operational metrics and SOPs for the threat team and owned applications/tools.
  • Responsible for cyber security assessment and Security auditing.
  • Responsible for threat advisory and security awareness program for the organization.
  • Responsible for preparing operational deck for the CISO and business.
Threat IntelligenceIncident ResponseVulnerability ManagementDigital ForensicsThreat HuntingAI in Cybersecurity+1

Infosys

Senior Associate Consultant - CyberSecurity

Feb 2019Jul 2020 · 1 yr 5 mos · Bengaluru, Karnataka, India

  • Working as a Team Lead of SOC, Molina Healthcare U.S. account.
  • Orchestrated the transition of project, from Molina, while being the part of transition.
  • Carry out end to end Incident response, Malware Analysis, Digital Forensics, Threat Hunting to support technical
  • analysis of malicious cyber security events.
  • Communicate effectively with representatives of the Lines of Business, technology specialists
  • Review threat information and maintain threat repository.
  • Conduct deep dive technical analysis of cyber-attack Tactics, Techniques, and Procedures
  • Involved in Threat Research, OSINT gathering, Intelligence Analysis
Incident ResponseMalware AnalysisDigital ForensicsThreat HuntingOSINT

Sony india software centre

Information Security Analyst - GSIRT

Jan 2017Feb 2019 · 2 yrs 1 mo · Bengaluru Area, India

  • Participating in NOC team and handling information security devices such as Splunk, Nitro, FireEye, Paradigm, McAfee ePO.
  • Providing effective support to configure Splunk and built log collecting from different sources such as SIEM receivers, Paradigm servers, Network devices, Syslog servers etc.
  • Creating Dashboards,Reports,Alerts for security devices for NOC and other platforms for SOC and OpCo.
  • Creating Dashboards for Tipping Point System log Events, FireEye EX email stats, Asset tracking etc.
  • Effectively participating in OS upgradation of Linux platform, Tipping point IDS/IPS, FireEye Devices.
  • Handling Active Directory Domain Controller to add or remove domain users.
  • Handling DUO for giving two way factor authentication to access security devices.
  • Monitoring and supporting the connectivity and system health of security devices.
  • Restarting the Nitro ESM services (cpservice and dbservice)
SIEMSplunkFireEyeSecurity MonitoringIncident Response

Vodafone

2 roles

Senior Executive

Sep 2015Nov 2016 · 1 yr 2 mos

  • Arbor:
  • Managing DDOS Services for a customer base of more than 60 Critical customers serviced on our Arbor Platform.
  • Knowledge on Traffic analysis and Alert Detection.
  • Supporting round clock for DDOS mitigation and Coordinate with customer for every attack.
  • Knowledge on Inline filter, Shaping and White-listing.
  • Managing Admin accounts and Alerting Rules.
  • Arc Sight:
  • Services for intrusion response via logs monitoring. Alerts that needs escalation is escalated within predefined SLA.
  • Managing IPS devices and update signature via ASDM.
  • Applying agent level filters.
  • Creating report, active channels.
  • Firewalls:
  • Doing implementation of the changes required on the Firewalls.(ASA, Checkpoint)
  • Creating and Maintaining Rule-base/Access List's on Firewalls.
  • Fine-Tuning of Firewall policies on customer demands & based on time intervals.
DDoS MitigationFirewall ManagementArcSightIncident Response

Graduate Engineering Trainee

Sep 2014Sep 2015 · 1 yr

Education

Modern College of Engineering, Pune

Bachelor of Engineering - BE — Electrical Engineering

Stackforce found 100+ more professionals with Threat Intelligence & Incident Response

Explore similar profiles based on matching skills and experience