Chandrakant Gangadhar Narsale
About Candidate
Education
Work & Experience
o Maintained and upgraded network hardware. o Documented system issues and all team actions. Taking & Attending ownership of the calls coming into Service Desk Engine o Installing, Supporting and Maintaining hardware and Software setup. o Maintaining active directory user’s (Creating user, unlock & reset the password) Structure in Window’s Server. o Maintain IO Mega (NAS)ix12 Network Attached Store server. o Take ADS server backup Weekly Basis & also AV Server Backup (Trend Micro Server). o Worked on load balancer Radware, escalated Link related issues to Vendor support.(Sify, Relaince. TATA) , Monitored different Server location’s. o Co-coordinating with vendors / engineers, for both software and hardware related issues. o Inventory - Maintaining a complete hardware as well as software inventory of computers, laptops and network equipment’s. o Logged call to vendor support team for faulty materials. o Installing N/W Printer(Hp 2420,Laserjet2300,Hp8150 LaserJet, Cannon_IR2318L),Scanner’s, applications etc. o Install anti-virus(Trend Micro Office scan systems) to ensure systems and Data are protected o Escalated Link Related issues to Vendor support.(Sify, Relaince. TATA) o Install SAP 7.1 Software & ESS s/w & troubleshoot SAP related issues. o Configuring Ms Outlook, Outlook Express. 365 Office installation o Worked on VMware workstation. o Install juniper VPN, Prop alms application & configured.
Implements information security policies and procedures for the organization o Reviews all system-related security plans throughout the organization's network, acting as a liaison to Information Systems. o Worked under PGP encryption security support teams – PGP agent installation, troubleshooting, implementation, configuration of PGP Policy for Desktop’s/Laptop’s for 1-200 user’s. o Co-ordinate with FM IT support team for PGP encryption agent deployment, permission issue, Token generation from console, shared token to user through Email/Phone. o Monitor the security of critical systems (e.g., e-mail servers, database servers, web servers, etc) and changes to highly sensitive computer security controls to ensure appropriate system administrative actions, investigate and report on noted irregularities o Monitors the internal control systems to ensure that appropriate access levels are maintained and prepares the disaster recovery plan. Worked on Endpoint Protection (Kaspersky AV, Symantec Endpoint Protection) Worked on Desktop/Server’s with Microsoft Patching. Monitored Network performance and uptime and responded quickly to incidents. o Monitor Network devices (e.g – Router, ISP Links, Radware, Server’s ) Through PRTG, Solar winds Protocol: TCP/IP, SMTP, IPSec, VPN, SSL, SSH
• Block and Unblock URL's request for End Users as per the defined standard Operating Procedure. • Report policy violations against controls defined in DLP. • Implementation, Configuration of DLP(Configuration of Detection Server on VM) Implementation, Configuration, Policy creation as per organization. • White List Email, IP Address as per Policy configuration. • DLP Incident Ticket creation and updating of event information & escalation of data breach. ● Provide information regarding intrusion events, security incidents, and other threat indications and warning information ● Scanning of critical servers which are Intranet and Internet facing to identify the gaps. ● Observe security solutions; SIEM, firewall appliances, intrusion prevention systems, data loss prevention systems, analysis tools, log aggregation tools. ● Technical analysis of network activity monitors and evaluates network flow. ● Symantec Endpoint Protection – Implementation, Policy Configuration, Agent deployment. (Symantec PGP) ● PGP (Symantec PGP encryption server) encryption Policy configuration, Token id generation for Desktop. ● Provided comprehensive report on findings and action items to fix the identified vulnerabilities. ● Web Application firewall, QRADAR monitoring of alert. ● Be able to explain in detail the OWASP top 10
● Working as a security Analyst with the Enterprise customers. ● Discover false positives in security events from multiple resources. e.g. Anti-Virus, Vulnerability Reports. ● Worked with Business 2 Business and Business 2 Consumer process, responding to Tickets assigned and take action maintaining SLA and basis of seriousness of the issue. ● Responding to Tickets assigned and takes action maintaining SLA and basis of seriousness of the issue. ● Implementation and Troubleshooting Kaspersky Security Centre Server and manage endpoint client machines through KSC server. ● Manage the day-to-day log collection activities of source devices that send log data. ● Monitor the health state of Antivirus (Agents running on User systems and Servers , Communication between agent and management Server). ● Conducting training of the juniors about the New Enhancements and Techniques in the product. ● Perform analysis of events/incidents and provide remediation suggestions to relevant owners ● Implement tasks/projects critical to the organizations Endpoint technologies (workstations, laptops, ATMs, mainframes, servers, etc.) ● Create and deliver reports to business lines pertaining to endpoint security, compliance, etc ● Manage Endpoint and alerting tools (agent deployment/setup, correlation and rule tuning, etc)
• Symantec PGP encryption for Laptop support (Implementation, Configuration, Policy management, Agent Deployment, Troubleshooting) • Symantec Endpoint , Trend Micro Deep Security– Installation of SEP, Disaster Recovery, Policy management, GUP configuration, Replication, Services of Symantec, Implementation. • QRADAR Monitoring of alerts (Security Devices, Business Application). • Perform, review and analyze security vulnerability data to identify applicability and false positives • Monitored IPS/IDS (Darktrace/Secureworks) Alerts. • Knowledge of security vulnerabilities and remediation as listed in sites like OWASP. • Monitored Firewall (Palo Alto) alerts. • Provide remote consulting services via interactive client sessions to assist with implementation of multiple product vendors and technologies • Scan Vulnerability for servers and application through Rapid 7. • Perform capacity planning and management tasks on a regular basis.