RAJ PRANESH M

About Candidate

● 2.5+ years of IT industry experience specializing in cybersecurity with a focus on penetration testing,
vulnerability management, and incident response.
● Proficient in conducting comprehensive penetration tests on web, mobile, and API applications using
tools such as Burp Suite, Postman, and other open-source options.
● Skilled in managing vulnerability assessment programs and prioritizing remediation efforts to
enhance overall security posture.
● Experienced in deploying and configuring EDR solutions like CrowdStrike Falcon and Sophos for
real-time security threat monitoring and mitigation.
● Adept at implementing MDM systems, particularly Microsoft Intune, to ensure the security of
corporate devices and sensitive data.
● Knowledgeable about cloud security principles and best practices, with hands-on experience in AWS
environments.
● Proficient in network security tools such as Wireshark and Nmap for monitoring and analyzing
network traffic.
● Skilled in incident response procedures, including detection, analysis, containment, eradication, and
recovery.
● Experience with SOAR (Security Orchestration, Automation, and Response) platforms to automate
security operations and enhance incident response capabilities efficiently.
● Strong understanding of secure coding practices, threat modeling, and security testing
methodologies.
● Proficient in driving automation initiatives through Jenkins DevSecOps pipelines to streamline
security processes.
● Expertise in Identity and Access Management (IAM), ensuring appropriate access controls, least
privilege principles, and compliance with security policies and regulations.
● Skilled in performing enterprise security gap assessments to identify weaknesses, vulnerabilities, and
areas for improvement in existing security measures.
● Dedicated to continuous learning and staying updated with emerging cybersecurity trends and
technologies.
● Proactive approach to risk mitigation and strengthening overall security posture.
● Dedicated to upholding the principles of the CIA triad, ensuring confidentiality, integrity, and
availability in cybersecurity operations.

Education

1
10th 2016
R.N. Oxford Matriculation school
1
12th 2018
Cheran Higher Secondary school
B
B.E in Computer Science 2022
Chettinad College of Engineering & Technology

Work & Experience

S
Security Engineer Nov 2021 - Present.
Cloud Destinations

ROLES & RESPONSIBILITIES ● Conducted penetration tests on Web, Mobile, and API applications using Burp Suite, Postman, and open-source tools to identify vulnerabilities. Provided detailed reports with recommendations for mitigation. ● Managed vulnerability assessment programs using Qualys for web application and server scanning. ● Deployed and configured Sophos endpoint security solutions across all devices within the organization, creating policies, monitoring, and mitigating identified threats. ● Implemented and managed mobile device management (MDM) using Microsoft Intune for securing corporate devices and data. Configured policies and compliance rules for enhanced security. ● Conducted AWS cloud security audits, providing detailed reports and recommendations to mitigate identified issues. ● Implemented cloud security best practices, AWS Security, Inspector, Config, and GuardDuty to secure cloud environments. ● Automated AWS cloud security audits, AWS GuardDuty, and Sophos alerts integration into both Slack and Microsoft Teams deployed on AWS Lambda, leveraging Python and Bash scripting. ● Implemented Jenkins DevSecOps pipeline to streamline security processes. Integrated SAST, SCA, DAST, and Container security open-source tools into the pipeline to identify vulnerabilities in the SDLC lifecycle and mitigate them effectively. ● Monitored and created firewall policies to block unwanted applications and sites, ensuring network security and control over traffic flow. ● Conducted security awareness training sessions for employees to educate them about phishing and other cybersecurity best practices. ● Set up phishing campaigns to test employee awareness and response to phishing attacks, analyzing results to identify areas for improvement in security awareness training and policies. ● Established the integration of web server and firewall logs into the Sumo Logic tool, configuring metrics and a live dashboard for real-time monitoring and analysis. ● Utilized SIEM tools to detect and respond to security incidents and created tickets for every time the incident occurred. ● Investigating malicious files, phishing emails, IP addresses, and domains using VirusTotal or other open-source tools, and providing recommendations for appropriate blocking based on the analysis. ● Remediating issues within the given SLAs and documenting findings to maintain accurate records for audit and compliance purposes. ● Performed the Enterprise security Gap assessment to identify weaknesses, vulnerabilities, and areas for improvement in existing security measures. ● Created threat modeling reports to proactively identify potential security threats and vulnerabilities, enabling preemptive action and risk mitigation. ● Utilized VirusTotal and other threat intelligence platforms for proactive threat hunting, analyzing suspicious files, URLs, and indicators of compromise to identify potential security threats and vulnerabilities. ● Managed AWS IAM users and permissions sets, ensuring appropriate access controls, least privilege principles, and compliance with security policies and regulations. ● Regularly reviewed and updated IAM policies to maintain security posture and mitigate risks associated with unauthorized access.

Be the first to review “RAJ PRANESH M”