Kartik Khare
About Candidate
Security Analyst with expertise in Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), Active Directory, and Web Application Firewall (WAF) technologies. Proficient in monitoring, analyzing, and responding to security events and incidents. |
Education
Work & Experience
Implemented Checkpoint Harmony EDR tool within the organization, configuring, testing, and maintaining various security policies according to different departments. Monitored various security event of multiple application in Radware Web Access Firewall. Configured content filtering policies in the firewall and integrated a Radius server in Active Directory with Cisco Meraki for password less authentication of Access Points. Implemented and maintained endpoint management tool(PC visor and Sure MDM). Created various security policies in GPO active directory.
Utilized Splunk for log management, monitoring, and analysis, as well as for detecting security incidents, investigating alerts, and responding effectively to mitigate threats. Proficient in proactively searching for signs of advanced threats or malicious activity within organizational environments using Splunk. Utilized CrowdStrike EDR to detect, analyze, and conduct thorough investigations on security threats in real-time, ensuring prompt identification, response, and root cause analysis to prevent future occurrence. Assisted in developing and implementing endpoint security policies and procedures based on various frameworks. Monitored to identify potential security gaps, anomalies, and conducted threat hunting activities to detect advanced threats and unauthorized activities. Developed and managed security policies on F5 WAF to safeguard web applications from various cyber threats, ensuring compliance with industry standards and regulatory requirements. Implemented proactive monitoring strategies using F5 WAF logs and analytics to identify suspicious activity, anomalies, and potential security incidents, facilitating timely response and mitigation. Conducted regular vulnerability assessments using Tenable SC to identify security weaknesses and potential risks across the organization's IT infrastructure.