MOHIT KUMAR MISHRA

20 July 1991

About Candidate

I am Mohit Kr. Mishra, MCA with 8+ Years of experience in Information Security Domain.
Currently I am working as a Technical Lead at TCS SOC team. Having rich experience in
Incident Handling, Email Security, Vulnerability Management, Endpoint Security, Security
Incident & Event management,
Right now, I am looking to join a company that has a trusting and vibrant environment, where I
can learn new things and utilize my past experience.

Education

1
10th 2006
U.P Board, Faridpur
1
12th 2009
U.P Board, Faridpur
B
B.C.A 2012
M.J.P.R.U, Bareilly
M
M.C.A 2015
U.P.T.U, Lucknow

Work & Experience

P
Project Engineer Jun-2015 - Nov-2017
Wipro LTD

Key Responsibilities:  Part of the SOC Team, responsible for monitoring and protecting the Client’s network through endpoint security management tool like Microsoft SCEP AV & Sophos AV.  Responsible for all clients (Server/Workstations) are having AV agent are healthy and running with Latest virus definition.  Scheduling the Weekly, Monthly and on demand scan for threat detection.  Creating the security policies for Exclusion/Inclusion to avoid the network conflict.  Part of the SOC Team responsible for the client Email Security.  Perform Daily, Weekly and Monthly proactive housekeeping and monitoring activities.  Harden the Windows and Linux servers to make more robust.  Conducting vulnerability assessment on time through Nexpose Rapid 7 scanning tool to find out Server/Network level hidden vulnerability and mitigate them.  Worked on ticketing tools like BMC Remedy, Jira & Service Now tool used for logging cases and incident handling.

S
Security Analyst Nov-2017 - - Oct 20
Micro land Ltd

Key Responsibilities:  Establishing standard procedures and guiding team resources to handle and analyze SOC incidents to prevent cyber threats.  Creating Dashboards, Reports and Alerts in Splunk SIEM for proactive and reactive threat monitoring.  Monitor/Investigate all the security incidents through Splunk.  Handling endpoint malware incidents through TrendMicro endpoint protection and act upon to protect client network against malware attacks.  Analyzing suspicious web-traffic logs, intrusion events detected by firewall, Zscaler cloud proxy and IDS/IPS respectively.  Handling on premise and cloud DLP incidents to prevent data leakage across the organization.  Experience on Slash NEXT to handle network security incidents like C & C server communication.  Threat hunting through Hexadite AIRS, Tanium.  Conducting vulnerability assessment through Qualys guard to prevent attacks due to vulnerabilities.  Phishing and malicious email analysis to prevent email threats accordingly

S
Security Analyst Oct 2018 - Mar 2021
Accenture Technology

Key Responsibilities:  Part of the SOC Team, responsible for monitoring and protecting the Client’s Endpoints & Network against malware attacks. Handling endpoint malware incidents Detected by EDR tools.  Taking Care of all Security incidents escalated by L1 engineers and making sure that IR process has been followed correctly while triaging the Incidents.  Worked on different -2 type of security incidents like Malware Infection MFA fraud alert, Suspicious traffic, Privileged Access related, Phishing attacks, Brute force & DDOS attack incident,  Performing Active monitoring for the alerts, to investigate proactively and suggest recommendation for any suspicious activity.  Using SIEM Tool Splunk for Alert/Notable notifications.  Performing the Vulnerability Assessment on timely bases to find out the Security flaws/Vulnerabilities in customer environment.  Creating new rules/patterns, & Dashboards (SIEM perspective) to have a view of the real time activities on the network.  Establishing standard procedures so team can handle the security incidents on time, and we can recover easily in case of any security outbreak.  Part of the SOC Team, responsible for the client Email Security also  Analyzing all the reported emails very carefully and educate the team members & Customers how to prevent email threats & Phishing attacks.

T
Technical lead March 2021 - Till Now
TCS

Key Responsibilities:  Being a Technical Lead, actively monitoring all the triggered alerts/incidents and make sure all Alerts/incidents handled as per agreed process on time by my time.  Helping Splunk admin to make new rules for monitoring suspicious activity from different log sources and Performing Fine tuning of the Use cases/Rules time to time to reduce the False positive Alerts/incidents.  Providing end to end investigation report with RCA to client for all high/Critical & True positive alerts/Incidents.  Taking Care of all Security incidents escalated by L1& L2 engineers and making sure that IR process has been followed correctly while triaging the Incidents/Alerts.  Having rich experience in triaging security incidents like Malware Infection, MFA fraud alert, Suspicious IDS/IPS traffic, Privileged Access & lateral movement related activities, Phishing attacks, Brute force & DDOS attack incidents.  Having good knowledge of OWASP top 10 Vuln & MITRE Framework.  Documenting & escalating all the process gaps & risks timely to client & management and make sure all such gaps & risks are remediated in planned way.  Preparing & presenting the Daily/weekly/Monthly executive report with client & management and documenting all the improvements & suggestions from client.  Process documents, Inventory, Fine tuning sheet, training & tool access tracker reviewing & updating periodically.  Performing vulnerability scan on weekly/monthly basis using Nexpose and make sure all high/critical vuln being remediated on time by respective teams.  In case of any newly(0day) threat/vulnerability detections, proactively collects IOCs from different open-source tools & News Feeds and continue the hunting in Splunk & Microsoft Defender tool to prevent such attacks.

Be the first to review “MOHIT KUMAR MISHRA”