Sarwar Ahmed Shaikh

24 February 1994

About Candidate

I certainly want to enable my extensive knowledge and experience to play a significant role in implementing and
delivering and a professional that can apply critical thinking, analytical, technical and innovation skills to protect
organizations from security breaches systems and grow as a cyber-security professional by gaining extensive
knowledge on other technologies under this domain.

Education

B
B.E in Electronics and Telecommunication 2016
Mumbai University

7.88 CGPI

D
Diploma in Electronics and Telecommunication 2013
MSBTE

75.09%

S
S.S.C 2010
MSBSHSE

84.91%

Work & Experience

A
Associate Consultant February 2017 - Current
Capgemini, Mumbai
S
SIEM (Splunk) - Admin

Worked on 2 deployments of distributed cluster Splunk Architecture of in which single handedly designed and deployed 1 of the architecture. Installation as well as Configuration of Indexers, Search Head, Cluster Master, Heavy Forwarder and Deployment Server on both Windows and Linux Servers. Deployment of Splunk in a cluster & distributed environment. Integrated various data sources with Splunk through Universal Forwarders, syslog, Heavy Forwarders, external feeds. Management of all Splunk instances through monitoring console as well as Cluster Master. Managing and configurations of thousands of Splunk Forwarders via Deployment server. Installation and configuration of Splunk Forwarder on Windows, Linux and AIX servers. Created Splunk app for automating the process of up gradation of Universal Forwarders on hundreds of Deployment client which could be done in few minutes. Activity of upgrading all Splunk instances done proficiently. Worked on Splunk DB connect for connecting databases into Splunk. Well familiar and worked on Splunk Enterprise Security app. Managed and worked on Splunk Threat Intelligence by integrating IOCs from external feeds as well by creating STIX, IOC file and pushing it into Splunk. Create security based use cases and alerts as per the business requirement. Worked and investigated on Notable events generated in Enterprise Security. Write customized parsers for search time and index time field extraction. Loads of resolution of issues in Splunk as well as when integrating varying types of data sources. Worked on Knowledge Objects such as Data Models, Datasets, Event Types, tags, Field Extraction, Lookups etc. Created various dashboards as per business requirement and troubleshooting of non-populating pre-built dashboards Study and investigate types of data source needed for an app in Splunk to work smoothly. Create daily, weekly and monthly reports according to business requirements in different forms like area graph, pie chart, column and bar graph etc. Co-relate VA and Threat Intel logs and make them work as a catalyst to existing log sources. Worked on ad-hoc or impactful security incident by doing extensive log analysis in Splunk. Decommissioned whole distributed environment of Splunk.

S
SIEM (Qradar)

Integration of various log sources into Qradar through wincollect, msrpc, jdbc, syslog etc. Upgradation of Qradar instance done profieciently. Rules, Alerts, Reports, Dashboard creation in Qradar according to business as well as operational requirement. Configured Qradar Threat Intelligence via STIX/TAXII feeds. Customised parsers for unparsed/unknown logs. Worked on Offenses and investigate & resolve them as per defined SLA.

V
Vulnerability Assessment (Nessus, Tenable)

Worked on Nessus Tools – Nessus Scanner, Nessus Manager, Tenable.io.  Implemented all the variants of Nessus for customer. Configuring and integrating of Nessus Scanner and Nessus Manager with Splunk. Creating and defining policies for Nessus scanning for different types of devices. Involved in vulnerability scanning, Vulnerability assessment and Vulnerability management. Perform monthly internal and external vulnerability assessment and recommend corrective measures for remediation. Perform operations through APIs. Helped customer mitigate Critical and High vulnerabilities within prescribed SLA

Awards

Splunk Certified Admin (LICENSE#: Cert- 255664) Splunk Certified Power User (LICENSE #: Cert-237722) Splunk Certified User (LICENSE #: Cert-211870) Certified Ethical Hacker (Certification Number: ECC35435437546) Computer Hacking Forensic Investigator (Certification Number: ECC4697851203)

Be the first to review “Sarwar Ahmed Shaikh”