Nishant Sharma

DevOps Manager

Bengaluru, Karnataka, India9 yrs 3 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • 9+ years of experience in cybersecurity.
  • Expertise in incident response and threat hunting.
  • Strong background in SIEM and forensic analysis.
Stackforce AI infers this person is a Cybersecurity Specialist with a focus on Incident Response and Threat Intelligence.

Contact

Skills

Core Skills

Security Incident ResponseDfirThreat HuntingSecurity Operations

Other Skills

Forensic AnalysisSplunkNetwork SecurityRoot Cause AnalysisEndpoint SecurityQRadarEmail AnalysisMalware AnalysisSecurity ToolsSOCIBM QradarSplunk Security EnterpriseKubernetesContainer securityPhishing Triage

About

Passionate Senior Security Incident Responder with 9 + years of experience safeguarding digital landscapes and fortifying cyber defenses to ensure robust, resilient, and secure environments. Holding industry experience in security domain (SIEM, Global Security Operational Center (GSOC) and Incident Response, DFIR, Cyber Threat Intelligence). I intent to be part of enthusiastic information security team where I can utilize my knowledge and teamwork capabilities in favor of the organization and continuous improvement through mutual learning process. I work mainly on defensive security covering endpoint, network, cloud and container security incident Response, deep level of root cause analysis on the security incidents, analyze the behavior and hunt for on the IOCs for security threats, perform remediation for security incidents, analysis of binary level composition for any suspicious files/payloads, mostly are the parts of my daily jobs. Currently working for Intel as Security Incident Responder and safeguarding Intel. Purple Teaming & Cyber Threat Intelligence is what attracts me more. You can contact me through my email id sharma.nishant0094@gmail.com

Experience

9 yrs 3 mos
Total Experience
2 yrs 3 mos
Average Tenure
3 yrs 9 mos
Current Experience

Intel corporation

2 roles

Security Incident Responder | SIRT

Promoted

Jul 2022Present · 3 yrs 9 mos · Bangalore · Hybrid

  • Working as a Security Incident Responder in Intel's Global Cyber Response Team, experiencing end to end Incident Response for Intel's network.
  • Responsibilities:
  • Detect and respond to company-wide security incidents, coordinating cross-functional teams to mitigate and eradicate threats.
  • Monitor and analyze emerging threats, vulnerabilities, and exploits.
  • Contribute to the development and implementation of scalable preventative security measures (detection, monitoring, exploitation)
  • Incorporate current security trends, advisories, publications, and academic research.
  • Communicate risks and mitigations across multiple audiences.
  • Experience with operating system internals and hardening, web application and browser security, and monitoring and intrusion detection.
  • Detect and independently respond to security incidents across an organization.
  • Conduct proactive threat hunting based on threat intel.
  • Perform forensic analysis of infected hosts independently.
  • Analyze network traffic and identify attacker activity.
  • Build and maintain scalable log ingestion and analytics platforms and tooling.
  • Perform a Postmortem root cause analysis (RCA) and incident reviews.
  • Work projects to completion across multiple teams, engineering, IT, development, communications, audit, legal.
Forensic AnalysisSplunkNetwork SecurityRoot Cause AnalysisEndpoint SecurityQRadar+5

Information Security Analyst

May 2019Dec 2021 · 2 yrs 7 mos · Bangalore

  • Investigation and Threat Hunting of Security Alerts on Splunk ES using TTP, Cyber Kill Chain and MITRE Attack
  • Methodology.
  • Detecting malicious activity of an attacker using tactics and techniques based on real-world observation as per
  • MITRE ATT&CK framework and other techniques during adversarial research.
  • Creating correlation rules in Splunk based on Threat Hunting scenarios using various logsources.
  • Contributing to various POC on cutting edge tools and technologies to find the best fit for the organization.
  • Developed solutions to automate the pain points faced by the team.
  • Investigating Cloud Based Incidents on different platforms like Microsoft O365(MCAS), Azure, AWS & GCP
  • including maintaining & finetuning their policies.
  • Investigating & Analyzing Phishing Campaigns with FireEye Email Security Solution & Cisco ESA including
  • setting up required email policies.
  • Analyzing Network Based anomalies with Forcepoint, McAfee NSM & Cisco Stealth watch, including
  • finetuning the firewall rules based on the requirements.
  • Dynamic Malware analysis with different sandboxes and perform root cause analysis for endpoint incidents, including this performing Static Malware Analysis in Malware Lab for special cases.
  • Building IOCs (both Static as well as Behavioural Ones) for threats & tools.
  • Conducting Phishing Exercises & training employees on aspects of Human Firewall.
Forensic AnalysisSOCSecurity Incident ResponseDFIRSecurity ToolsThreat Hunting

Sophos

Information Security Engineer

Dec 2021Jun 2022 · 6 mos · India

Forensic AnalysisSOCSecurity Incident ResponseDFIRSecurity Tools

Wipro limited

2 roles

Project Engineer

Dec 2016May 2019 · 2 yrs 5 mos

  • Working as an Information Security Analyst @Wipro Technologies. Have overall 2 years of experience in IT Industry and looking for a better opportunity to enhance my skills in the field of Information Security.
  • Project Details
  • Project Name: SIaaS (Security Intelligence as a Service) and Network Monitoring using Splunk
  • Tools : IBM Qradar and Splunk Security Enterprise
  • Client: Multiple Clients from different regions of Globe (Shared Services)
  • Description:
  • SIaaS (Security Intelligence as a Service), is responsible for monitoring and handling the security of clients using various SIEM tools and other security products.
  • Using Splunk Security Enterprise, I am responsible for monitoring and analyse the triggered notable events. Deploying new correlation searches and update the deployed ones. Creation of Dashboards and perform Threat Hunting.
  • Project Role: L2 (SPOC for 2 customers)
SOCSecurity ToolsSecurity Operations

Information Security Analyst

Dec 2016May 2019 · 2 yrs 5 mos

SOCSecurity Tools

Wipro infotech

Summer Intern

May 2015Jun 2015 · 1 mo

  • Industrial guide helps to plan and carry out a corporate deployment of SCCM and
  • understanding the working of McAfee antivirus to deal with security issues in
  • organization.

Hewlett-packard

Summer Intern

Jun 2014Jul 2014 · 1 mo

Education

Amity University

B-Tech — Computer Science

Jan 2012Jan 2016

Stackforce found 100+ more professionals with Security Incident Response & Dfir

Explore similar profiles based on matching skills and experience