Deepak Shrivastava

About Candidate

Education

• M.sc Physics from Vinayaka Missions • B.sc Physics (Hons.) from IGNOU. • Senior Secondary from C.B.S.E. Board. • Secondary from C.B.S.E. Board.

Work & Experience

C
Consultant 2018 - till date
Virtusa

• Coordinating and maintaining SOC Audit. • Produce and maintain Standard Operating Procedures and appropriate documentation for SOC. • Identify gaps, disseminate findings and reports to the system owners and follow up for closure. • Analyse new security solutions, identify potential security concerns, develop approaches that can be used to mitigate identified risks and works with IT teams to implement recommendations. • Classification of risk associated with data leakage. • Identify threat scenarios, quantifying the risks and working out and executing effective mitigation controls including evaluates security incidents and determines what response, if any, is needed and coordinates organization’s responses, including technical incident response teams, when sensitive information is breached. • Assess risks to IT systems’ availability, integrity and confidentiality to ensure security and service continuity. • Investigating in advert data disclosure. • Classification of data disclose (e.g. Confidential, Highly Restricted etc). • Taking remediation again data leakage and for in advert data disclosure. • Recommend security improvements to optimize security controls including identifying industry best practices, standards, methods, tools, and application to optimize the organization business risk management. • Malware analysis through Sandbox. • Investigating reported security incidents, threats and violations • Collecting data and creating regular reports of security related activity and SOC metrics. • Open change control to mitigate identified risk. • Log analysis of events reported by SIEM tool.

S
Senior Information Security Engineer 2016 - 2018
FIS Global Business Solutions Pvt. Ltd

• Responsible for taking action on alerts, events, and incidents escalated from analyst. • Monitoring for emerging threat patterns and vulnerabilities. • Handling High and Critical Incidents. • Communicates with management on incident updates. • Identify and remediate or escalate gaps. • Review and Fine Tune for SIEM alerts. • Manage and improve information security documentation as required. • Compiling SOC (Security Operation Centre) Runbook. • Manage Internal Audit for SOC. • Manage Documentation for ISO Audit. • Fine Tune suggestions of IDS, Firewalls, network monitoring sensors. • Perform network and system forensics in response to security incidents. • Perform security monitoring, Investigation and analysis of Event towards internal/external environment. • Log Analysis and event traffic patterns investigation. • Making report on Current IT Threat landscape and upcoming trends in security. • Review Low and Medium Severity Incidents work done by L1 Team Members. • Providing KT to new L1 and L2 Team Members. • Providing Training Session on Cyber Security to CFC Team. • Review Tripwire, PCI, CyerArk and Solidcore Reports. • Analysis of Phishing Incidents • Analysis for Firewall, IPS/IDS logs

B
Blue Umbrella Pvt. Ltd. 2015 - 2016
System Administrator

• Managing Window Server 2008, 2012 • Managing Exchange Server 2010 • Managing Kaspersky EPO Server • Managing Fort iGATE 90D Firewall. • Managing SonicWALL NSA TZ 600 firewall • Creation of SSL VPN and Site to Site VPN • Vulnerability assessment of Server and web application • Implementation of ISO 270001 Security Audit • Install security patches to window server, EPO server, Exchange Server • Review system logs • Report malicious or suspicious activity on systems to ISO immediately • Report sensitive information stored on systems to ISO • Maintain user access administration • Disaster recovery planning • Physical security • Disable unnecessary services on servers • Comply with password requirements • Access control • Environmental protection (i.e., protection from possible exposure to water damage, excessive heat)

S
Senior Faculty 2014 - 2015
Jetking Infotrain Ltd.

• Maintaining Audit Documentation. • Providing training of Ethical Hacking, Network Security, VAPT Training with kali Linux and Backtrack. • LMS Implementation PAN India and Training of LMS. • Preparing log sheet. • Preparing assignment for students. • Administration & Management of LABs for student. • Giving the project to the students on real scenario. • Take care all the labs updating & maintenance. • Manage & update technical team including lab assistance.

Awards

✓ ISO 27001 Lead Auditor – From BSI. ✓ BUSINESS CONTINUITY & DISASTER RECOVERY PLANNING – From Cybrary. ✓ PCI/DSS -From Cybrary. ✓ ORGANIZATIONAL DATA SECURITY FUNDAMENTALS – From Cybrary. ✓ Fundamentals of Vulnerability Management – From Cybrary. ✓ Cyber Warfare and Terrorism - From IT Masters (Charles Sturt University). ✓ CEH V8 -ECC19310859484 – From EC- Council. ✓ ECSA V9- ECC28613978148 From EC- Council. ✓ Nessus Foundation – From Cybrary. ✓ Phishing Countermeasure – From IT Masters (Charles Sturt University). ✓ Information Security Incident Handling - From IT Masters (Charles Sturt University). ✓ MCSE 2012-Server Infrastructure - From Microsoft. ✓ MCTS Hyper-V 2012 and System Centre - From Microsoft. ✓ MCP ID- 5785215 - From Microsoft. ✓ CCNA from Cisco (ID-CSCO12567650) - From CISCO. ✓ Qualys Certified Specialist- Vulnerability Management. ✓ ITIL® Foundation Certificate in IT Service Management (ID-4988440). ✓ Splunk Certified User. ✓ Preparing for CISSP

Be the first to review “Deepak Shrivastava”