GUNDARAPU VSNV PRASADU
About Candidate
A technical professional with 4+ years of experience in cyber security, SIEM, AV, malware analysis and Data loss prevention. Working in different environments in several roles on multiple technologies has given me good exposure, which not only helps me learn new things faster but also allows me to provide a solution with great results. My understanding of any business requirements and implementing it from a technical stand-point converts my projects and tasks to success endeavours in a teams |
Education
Work & Experience
Working as a Security Analyst, Performing Real-Time Monitoring, Investigation, Log Analysis, Reporting and Escalations of Security Events from multiple log sources. Indulged in fine tuning of work structure and triaging of the incidents. • Monitoring the customer network using SIEM tool –Splunk, IBM QRadar. • Worked on incidents and suggested required changes to make the task easier. • Monitoring security alerts and raw logs as well as alerts triggered in SIEM tool integrated with various devices like IDS/IPS, Firewalls, Endpoint tools to make sure all the company assets are free from external attacks. • Working on DLP incidents and policy fine tuning. Managing the customer queries on blocking and helping with the solutions. Escalating the incidents to the respective departments. Education Declaration • Performing daily activities, monitoring and remediation of servers/workstations for virus infections and threats. • Analyse issues & escalate to appropriate Levels. • Knowledge on basic trouble shooting. • Understanding phases of QRadar event life cycle and describe the functional processing which occurs during each phase. • Daily SIEM Health check and troubleshooting the issues. • Conduct regular false analysis on the existing content. Define monthly/quarterly reports/trends as per internal team requirement. • Collect the suspicious files/script and perform malware analysis using sandboxing. • Hands-on experience in security incident response lifecycle and its phases. • Identify gaps in IT infrastructure by mimicking an attacker’s behaviours and responses. • Provide expert analytic investigative support of large scale and complex security incidents. • Direct prior experience with core Security Technologies (SIEM, firewalls, IDS/IPS, HIPS, proxies, etc.)