Shruthi Biradar

Security Engineer

Bengaluru, Karnataka, India7 yrs 5 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Expert in Cyber Threat Hunting and Malware Analysis
  • Proven track record in Security Research and Development
  • Strong background in Application Security and Threat Management
Stackforce AI infers this person is a Cybersecurity Specialist with expertise in threat analysis and application security.

Contact

Skills

Core Skills

Cyber-securityThreat & Vulnerability ManagementMalware Behavior AnalysisStatic AnalysisThreat ModelingCyber Threat Hunting (cth)

Other Skills

Application SecurityDiplomacyNetwork SecuritySOARSecurity Information and Event Management (SIEM)TactfulnessWeb Application Security AssessmentWeb ApplicationsWiresharkburpsuitecustomer escalation handlingfalse positive analysisheuristics developmentmalware replication

Experience

7 yrs 5 mos
Total Experience
2 yrs 5 mos
Average Tenure
4 yrs 5 mos
Current Experience

Amazon

Security Engineer

Dec 2021Present · 4 yrs 5 mos · Bengaluru, Karnataka, India

Cyber-securitySOARCyber Threat Hunting (CTH)Web Application Security AssessmentThreat ModelingWeb Applications+6

Mcafee

Security Researcher

Jul 2021Dec 2021 · 5 mos · Bengaluru, Karnataka, India

  • Performing malware replication and analyzing the malware behavior to develop heuristics for
  • behavioral detections.
  • Performing static analysis to develop heuristics based on static properties.
  • Analyzing false positives and solutions to resolve them
  • Handling customer escalations and resolving them within the SLA
malware replicationmalware behavior analysisheuristics developmentstatic analysisfalse positive analysiscustomer escalation handling

Mindtree

Security Researcher

Nov 2018Jun 2021 · 2 yrs 7 mos · Hyderabad, Telangana, India

  • Microsoft Threat Experts
  • Worked as a Researcher in ATP (Advanced Threat Protection) product of Microsoft.
  • Writing logic to trap the malicious activities.
  • Analyzing Events and Logs having malicious behavior of victim’s machine through Trap results.
  • Worked on critical threat-adversary, hands-on-keyboard, lateral movement, data exfiltration, etc., could
  • also be incredibly impactful - ransomware, advanced phishing, alert outbreak.

Education

National Law School of India University, Bangalore

Post Graduation Diploma — Cyber Law and Cyber Forensics

Sep 2023Aug 2024

Visvesvaraya Technological University

Bachelor of Engineering - BE — Computer Science

Jan 2014Jan 2018

Stackforce found 100+ more professionals with Cyber-security & Threat & Vulnerability Management

Explore similar profiles based on matching skills and experience