Ashok B
About Candidate
Highly seasoned Information Security professional with a proven track record spanning over 4 years, steadfastly committed to fortifying information security systems and ensuring unwavering compliance. I am actively seeking opportunities to harness my wealth of experience in conducting comprehensive threat analysis, executing rapid incident response, and Vulnerability management. · Proven track record of responding efficiently to security incidents, including incident identification, containment, and remediation. · Demonstrated ability to proactively identify and mitigate security threats, reducing potential risks to organizational assets. · Proficient in utilizing Glass monitoring tools and technologies to maintain continuous vigilance over network activity, enhancing overall security posture. · Adept at staying updated with the latest threat intelligence sources and integrating this information into security protocols for proactive defense. · Dedicated to ensuring the integrity and confidentiality of critical systems and sensitive data. |
Education
Work & Experience
• Conducted real-time monitoring of customer networks to identify and respond to security threats promptly. • Utilized glass monitoring tools and technologies to maintain a vigilant watch over network activity. • Played a pivotal role in enhancing security operations by actively contributing to the development and improvement of security policies and procedures. • Participated in security awareness training and education programs to adapt security-conscious culture. • Lead and assisted incident response processes, including identifying, containing, and mitigating security incidents. • Collaborated with Tier 1 and Tier 3 teams to ensure a swift and coordinated response to security incidents. • Conducted proactive threat hunting exercises to identify potential vulnerabilities and threats before they escalate. • Employed advanced techniques and tools to uncover hidden security risks. • Managed and maintain endpoint security, ensuring all devices adhere to security policies. • Conducted regular vulnerability scans and assessments of systems and applications. • Provided recommendations for patch management and vulnerability remediation. • Utilized threat intelligence to proactively identify and defend against emerging threats. • Contributed to identity and access management (IAM) improvements to strengthen security controls. • Generated detailed incident reports for all security incidents, including breaches, vulnerabilities, and potential threats. • Ensured that incident reports contain essential information such as the incident's nature, impact, and recommended actions.