N.G. Janakiram

DevOps Engineer

Dubai, United Arab Emirates0 mo experience

Key Highlights

  • Passionate about cybersecurity and threat detection.
  • Experienced in incident response and security monitoring.
  • Proficient with SIEM and EDR tools.
Stackforce AI infers this person is a Cybersecurity Analyst with expertise in threat detection and incident response.

Contact

Skills

Core Skills

Cybersecurity Incident ResponseSecurity MonitoringIncident ResponseThreat AnalysisDocumentationPenetration Testing

Other Skills

Analytical SkillsAzure SentinelComputer NetworkingCritical ThinkingCrowdStrike FalconCryptographyCyber DefenseCyber Kill Chain FrameworkData AnalysisHack The Box AcademyHacking LabsHuntingIBM QRadarIBM ResilientIncident Investigation

Experience

Securityhq

SOC Analyst

Jan 2023Present · 3 yrs 2 mos · Dubai, United Arab Emirates · On-site

  • 1. Security Monitoring and Analysis:
  • Monitor SIEM alerts through IBM Qradar and Azure Sentinel.
  • Conduct endpoint investigations using CrowdStrike Falcon
  • Analyze detected threats across the company.
  • 2. Email Security:
  • Monitor company emails using Mimecast and Proofpoint.
  • Investigate phishing threats and malware events in emails.
  • 3. Incident Response:
  • Assume responsibility for meticulous documentation using SHQ platforms.
  • Operate in rotational shifts for real-time threat detection and rapid incident response.
  • 4. Investigations and Analysis:
  • Analyze security incidents, including phishing emails.
  • Investigate high-priority threat campaigns and malicious actors.
  • Assess legitimacy using online resources (VirusTotal, IBM X-Force Exchange, urlscan.io, MX Toolbar).
  • 5. Continuous Learning:
  • Stay current with the evolving cybersecurity landscape.
  • Conduct research and engage in ongoing learning.
  • 6. Documentation and Reporting:
  • Document all levels of security threats Use IBM Resilient ticket system for reporting.
  • Create tickets in IBM Resilient and escalate to technical teams in Shq platform.
  • 7. Collaboration:
  • Work closely with teammates to fine-tune and deploy scalable security controls.
  • Collaborate with teams to brainstorm and prototype solutions.
  • 8. Shift Responsibilities:
  • Responsible for initiative shift turnover.
  • Document shift activities summary.
  • 9. Cybersecurity Knowledge:
  • Possess comprehensive knowledge of Cyber Kill Chain, CVE catalog, and MITRE ATT&CK framework.
  • 10. Analysis and Mitigation:
  • Provide analysis and containment of compromised systems.
  • Mitigate issues with root cause analysis.
Static AnalysisCritical ThinkingIncident InvestigationData AnalysisRoot Cause AnalysisAnalytical Skills+12

Accel limited

Security Analyst

Nov 2022Aug 2023 · 9 mos · Chennai, Tamil Nadu, India

  • Junior Security Analyst
  • Framework - CyberKillChain , MITRE ATT&CK
  • SIEM Tools : Alien Vault , Cybolt

Seasides information security conference

Security conference

Aug 2022Aug 2022 · 0 mo · Goa, India

Cyberxchange

Ethical Hacking intern

Jul 2022Oct 2022 · 3 mos · Delhi, India

  • Learning OWASP10
  • Webapp pentesting
  • Cryptography
  • Networking fundamental -> OSI Model /TCP IP Model
  • CVE , CWE and CVSS
  • Research on Zero day vulnerability like Follina ,log4j ..etc

Hack the box

Learning Penetration Testing

Apr 2022Dec 2022 · 8 mos · Chennai, Tamil Nadu, India

  • A massive , cybersecurity training Platform
  • Totally i love it,
Penetration TestingCryptography

Tryhackme

Tryhackme | CFT Player

Mar 2021Dec 2022 · 1 yr 9 mos · Chennai, Tamil Nadu, India

  • Currently the rank is Top 1%
  • Solved 75+ Rooms ,CTF challenges
  • learning daily Cyber Security ,WAPT , OWASP Top 10
Penetration Testing

Education

Anna University Chennai

Bachelor of Engineering - BE — Computer Science

Jan 2018Jan 2022

Stackforce found 100+ more professionals with Cybersecurity Incident Response & Security Monitoring

Explore similar profiles based on matching skills and experience