SREEKANTH M S
About Candidate
Solid understanding of common network services and protocols. Good knowledge on cyberattacks and attack vectors. Working level knowledge on security solutions like Antivirus, Firewall, IPS, Email Gateway, VA Scanners, WAF, EDR, SIEM, NSM etc. Expert knowledge on skills like Vulnerability Assessment and Penetration testing, Malware Analysis, Threat Hunting, and Compromise Assessment. Expertise in various SOC processes like monitoring, analysis, playbooks, escalation, incident documentation, SLAs, client meetings, report walk throughs, bridge calls, RFPs, etc. |
Education
Work & Experience
• Security Professional with experience in penetration testing and vulnerability assessments on various applications in different domains. • Deep dive analysis of triggered alerts using SIEM, SOAR, XDR and other analysis tools. • Acknowledging and closing false positives and raising tickets for validated incidents. • Assist IRT teams in incident remediation by providing supporting data and recommendations. • Part of incident response team for remediation • Monitoring and troubleshooting Silent Log Sources • Research, compile and organize weekly and monthly SOC reports. • Participate in weekly SOC meetings to discuss about raised incidents. • Threat hunting based on the hypothesis developed by SOC Lead. • Conduct research (OSINT, CVEMITRE, etc.) to generate new threat intelligence. • Sound knowledge and industry experience in Vulnerability Assessment and Penetration testing on Web based applications, Mobile based applications, Network penetration testing and Compromise Assessments.
• Leveraged multiple SIEM (Security Information and Event Management) platforms, including Splunk to monitor and analyze security events and incidents in real-time. • Proficiently utilized EDR (Endpoint Detection and Response) solutions such as Carbon Black, Crowdstrike, and SentinelOne to detect and respond to advanced threats across the organization's endpoints. • Conducted in-depth analysis of security alerts and incidents, triaging and escalating as necessary to minimize potential risks and maintain the integrity of the organization's data and systems.