SlideShare a Scribd company logo
1 of 2
Divya Rajappa
# 9/1, Lancer Road,
1st Floor, 1st Cross,
Mattadhahalli,
RT Nagar Post
Bangalore – 560032
+91-9036182429
 divya.rajath@hotmail.com
PROFESSIONAL ABSTRACT
To be allied with an organization that provides most challenging and fascinating career
opportunities and to apply my knowledge and skills for organizational intensification. A
job that gives me an opportunity to work at the chief edge of technologies to learn, to
innovate, and to feel the pleasure of achievement.
KEY SKILLS:
ArcSight/RSA envision, Checkpoint, Websense, Symantec Endpoint Protection and IDS/
IPS
Operating Systems : Windows 2012 Server, Windows 2008 Server
Hardware Technologies : Firewall, Routers, Switches
PROFESSIONAL SUMMARY
 Global SOC processes and SIEM technologies involved in providing situational
awareness through the detection, containment, and remediation of IT threats.
 Manages incidents for the enterprise, ensuring they are properly identified and
analyzed, communicated, action/defended, investigated and reported.
 Monitor applications to identify a possible cyber-attack or intrusion (event) and
determine if it is a real, malicious threat (incident), and if it could have a business
impact.
 Malware analysis and take action plan (reverse engineering).
 Enforce strict access criteria and need-to-know and least privilege practices.
Suggest to disable unneeded system failures, services and ports.
 Ensure the user accounts are Identified, Authenticated and Authorized to use the
resources to avoid Brute Force attacks. Deny access to systems by undefined
users or anonymous accounts.
 Limit and monitor the usage of administrator and other powerful accounts.
 Handling Daily/Weekly Report generation Manually/Automated and ensure the
recipients receives the same in a timely manner.
 Handling Incident Tickets – Creation, Escalation, Follow-up cases till closure.
TECHNICAL QUALIFICATION
 Certified Ethical Hacker – CEH,
 Diploma in Computer Appliances – DCA,
 Advanced Diploma in Computer Hardware and Networking – ADCHN,
EDUCATIONAL QUALIFICATION:
Bachelor of Commerce from Jyothi Nivas College
Year of passing: 2011
Percentage: 74%
XII Standard from Jyothi Nivas College
Year of passing: 2008
Percentage: 79.5%
SSLC (10th) From St. Joseph’s Girl’s High School
Year of passing: 2006
Percentage: 89.5%
WORK EXPERIENCE:
 Currently working in Tesco for IT Security Department as Operations Support.
 Worked in Infosys.
KEY COMPETENCIES
 Efficient Proficient & Perfectionist
 Capability to Meet Deadlines and Work under Pressure in a Fast Paced
Atmosphere
 Discretion and Understanding the Need for Confidentiality
 Competence with Using Common Office Systems and Software
 Hard Working and Detail - Oriented
LANGUAGES KNOWN:
ENGLISH - Read, write and speak with a neutral accent.
Date: Yours Truly
Place: Divya

More Related Content

What's hot

Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
Dhishant Abrol
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
rajkumar jonuboyena
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118
Erik Ginalick
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
amrutharam
 
Nachaat Mohamed resume
Nachaat Mohamed resumeNachaat Mohamed resume
Nachaat Mohamed resume
Nachaat
 

What's hot (20)

Cv ( puneet aggarwal )
Cv ( puneet aggarwal )Cv ( puneet aggarwal )
Cv ( puneet aggarwal )
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
How to Enhance Vulnerability Management with Intelligence plus Analytics
How to Enhance Vulnerability Management with Intelligence plus AnalyticsHow to Enhance Vulnerability Management with Intelligence plus Analytics
How to Enhance Vulnerability Management with Intelligence plus Analytics
 
Cv gulam rasool
Cv gulam rasoolCv gulam rasool
Cv gulam rasool
 
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad AndrewsNTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
 
6 Most Popular Threat Modeling Methodologies
 6 Most Popular Threat Modeling Methodologies 6 Most Popular Threat Modeling Methodologies
6 Most Popular Threat Modeling Methodologies
 
How to develop an AppSec culture in your project
How to develop an AppSec culture in your project How to develop an AppSec culture in your project
How to develop an AppSec culture in your project
 
Comptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident responseComptia security sy0 601 domain 4 operation and incident response
Comptia security sy0 601 domain 4 operation and incident response
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
 
Imran Resume
Imran ResumeImran Resume
Imran Resume
 
What is Security Orchestration?
What is Security Orchestration?What is Security Orchestration?
What is Security Orchestration?
 
Bradley Weatherill resume
Bradley Weatherill resumeBradley Weatherill resume
Bradley Weatherill resume
 
Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118Healthcare It Security Necessity Wp101118
Healthcare It Security Necessity Wp101118
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Cybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen CyberCybersecurity Career Information by Next Gen Cyber
Cybersecurity Career Information by Next Gen Cyber
 
Need Of Security Operations Over SIEM
Need Of Security Operations Over SIEMNeed Of Security Operations Over SIEM
Need Of Security Operations Over SIEM
 
Nachaat Mohamed resume
Nachaat Mohamed resumeNachaat Mohamed resume
Nachaat Mohamed resume
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 

Viewers also liked

nơi nào dịch vụ giúp việc văn phòng giá tốt ở hồ chí minh
nơi nào dịch vụ giúp việc văn phòng giá tốt ở hồ chí minhnơi nào dịch vụ giúp việc văn phòng giá tốt ở hồ chí minh
nơi nào dịch vụ giúp việc văn phòng giá tốt ở hồ chí minh
pricilla894
 
Sylvia srnic rationale pdhpe
Sylvia srnic rationale pdhpeSylvia srnic rationale pdhpe
Sylvia srnic rationale pdhpe
syl931
 
New Microsoft Office Word Document
New Microsoft Office Word DocumentNew Microsoft Office Word Document
New Microsoft Office Word Document
Mai Cuong
 
Nhận biết sớm và điều trị đột quỵ, tai biến mạch máu não
Nhận biết sớm và điều trị đột quỵ, tai biến mạch máu nãoNhận biết sớm và điều trị đột quỵ, tai biến mạch máu não
Nhận biết sớm và điều trị đột quỵ, tai biến mạch máu não
leroy374
 
1-Mostafa-Experience Certificate-ENG-Final-JPG
1-Mostafa-Experience Certificate-ENG-Final-JPG1-Mostafa-Experience Certificate-ENG-Final-JPG
1-Mostafa-Experience Certificate-ENG-Final-JPG
Mahmoud Attallah
 

Viewers also liked (17)

Round table presentation - MALET at Empire State College
Round table presentation - MALET at Empire State CollegeRound table presentation - MALET at Empire State College
Round table presentation - MALET at Empire State College
 
Raindance for blog
Raindance for blogRaindance for blog
Raindance for blog
 
Gmupd m 001.06.13
Gmupd m 001.06.13Gmupd m 001.06.13
Gmupd m 001.06.13
 
9 10 11_sinif_a
9 10 11_sinif_a9 10 11_sinif_a
9 10 11_sinif_a
 
Impuestos en alimentos con alta densidad calorica
Impuestos en alimentos con alta densidad caloricaImpuestos en alimentos con alta densidad calorica
Impuestos en alimentos con alta densidad calorica
 
nơi nào dịch vụ giúp việc văn phòng giá tốt ở hồ chí minh
nơi nào dịch vụ giúp việc văn phòng giá tốt ở hồ chí minhnơi nào dịch vụ giúp việc văn phòng giá tốt ở hồ chí minh
nơi nào dịch vụ giúp việc văn phòng giá tốt ở hồ chí minh
 
Conocimiento tecnológico
Conocimiento tecnológicoConocimiento tecnológico
Conocimiento tecnológico
 
Sylvia srnic rationale pdhpe
Sylvia srnic rationale pdhpeSylvia srnic rationale pdhpe
Sylvia srnic rationale pdhpe
 
New Microsoft Office Word Document
New Microsoft Office Word DocumentNew Microsoft Office Word Document
New Microsoft Office Word Document
 
Музы И.А. Бунина
Музы И.А. БунинаМузы И.А. Бунина
Музы И.А. Бунина
 
Wendy_chavez
Wendy_chavezWendy_chavez
Wendy_chavez
 
Introdução
IntroduçãoIntrodução
Introdução
 
Nhận biết sớm và điều trị đột quỵ, tai biến mạch máu não
Nhận biết sớm và điều trị đột quỵ, tai biến mạch máu nãoNhận biết sớm và điều trị đột quỵ, tai biến mạch máu não
Nhận biết sớm và điều trị đột quỵ, tai biến mạch máu não
 
Abd gestion
Abd gestionAbd gestion
Abd gestion
 
1-Mostafa-Experience Certificate-ENG-Final-JPG
1-Mostafa-Experience Certificate-ENG-Final-JPG1-Mostafa-Experience Certificate-ENG-Final-JPG
1-Mostafa-Experience Certificate-ENG-Final-JPG
 
Leia, porque é da sua conta!
Leia, porque é da sua conta!Leia, porque é da sua conta!
Leia, porque é da sua conta!
 
Transcript UWO
Transcript UWOTranscript UWO
Transcript UWO
 

Similar to Divya1CV (1)

NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
James Perry, Jr.
 
Andre Resume 2016
Andre Resume 2016Andre Resume 2016
Andre Resume 2016
Andre Diniz
 
Brandon Anderson Resume 2016
Brandon Anderson Resume 2016Brandon Anderson Resume 2016
Brandon Anderson Resume 2016
Brandon Anderson
 
Platinum CV - 947285 - Rima Al-Jamed
Platinum CV - 947285 - Rima Al-JamedPlatinum CV - 947285 - Rima Al-Jamed
Platinum CV - 947285 - Rima Al-Jamed
Rima Aljamed
 

Similar to Divya1CV (1) (20)

tarunidhar
tarunidhartarunidhar
tarunidhar
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
 
Andre Resume 2016
Andre Resume 2016Andre Resume 2016
Andre Resume 2016
 
Brandon Anderson Resume 2016
Brandon Anderson Resume 2016Brandon Anderson Resume 2016
Brandon Anderson Resume 2016
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security Operations
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Platinum CV - 947285 - Rima Al-Jamed
Platinum CV - 947285 - Rima Al-JamedPlatinum CV - 947285 - Rima Al-Jamed
Platinum CV - 947285 - Rima Al-Jamed
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Becoming a Defender (Blue Teams FTW!)
Becoming a Defender (Blue Teams FTW!)Becoming a Defender (Blue Teams FTW!)
Becoming a Defender (Blue Teams FTW!)
 
Resume.
Resume.Resume.
Resume.
 
MarcEmmanuelACV
MarcEmmanuelACVMarcEmmanuelACV
MarcEmmanuelACV
 
Tamara M Hayajneh
Tamara M HayajnehTamara M Hayajneh
Tamara M Hayajneh
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?Vulnerability Ass... Penetrate What?
Vulnerability Ass... Penetrate What?
 
Praveen-Resume
Praveen-ResumePraveen-Resume
Praveen-Resume
 
How To Become An IT Security Risk Analyst
How To Become An IT Security Risk AnalystHow To Become An IT Security Risk Analyst
How To Become An IT Security Risk Analyst
 

Divya1CV (1)

  • 1. Divya Rajappa # 9/1, Lancer Road, 1st Floor, 1st Cross, Mattadhahalli, RT Nagar Post Bangalore – 560032 +91-9036182429  divya.rajath@hotmail.com PROFESSIONAL ABSTRACT To be allied with an organization that provides most challenging and fascinating career opportunities and to apply my knowledge and skills for organizational intensification. A job that gives me an opportunity to work at the chief edge of technologies to learn, to innovate, and to feel the pleasure of achievement. KEY SKILLS: ArcSight/RSA envision, Checkpoint, Websense, Symantec Endpoint Protection and IDS/ IPS Operating Systems : Windows 2012 Server, Windows 2008 Server Hardware Technologies : Firewall, Routers, Switches PROFESSIONAL SUMMARY  Global SOC processes and SIEM technologies involved in providing situational awareness through the detection, containment, and remediation of IT threats.  Manages incidents for the enterprise, ensuring they are properly identified and analyzed, communicated, action/defended, investigated and reported.  Monitor applications to identify a possible cyber-attack or intrusion (event) and determine if it is a real, malicious threat (incident), and if it could have a business impact.  Malware analysis and take action plan (reverse engineering).  Enforce strict access criteria and need-to-know and least privilege practices. Suggest to disable unneeded system failures, services and ports.  Ensure the user accounts are Identified, Authenticated and Authorized to use the resources to avoid Brute Force attacks. Deny access to systems by undefined users or anonymous accounts.  Limit and monitor the usage of administrator and other powerful accounts.  Handling Daily/Weekly Report generation Manually/Automated and ensure the recipients receives the same in a timely manner.  Handling Incident Tickets – Creation, Escalation, Follow-up cases till closure.
  • 2. TECHNICAL QUALIFICATION  Certified Ethical Hacker – CEH,  Diploma in Computer Appliances – DCA,  Advanced Diploma in Computer Hardware and Networking – ADCHN, EDUCATIONAL QUALIFICATION: Bachelor of Commerce from Jyothi Nivas College Year of passing: 2011 Percentage: 74% XII Standard from Jyothi Nivas College Year of passing: 2008 Percentage: 79.5% SSLC (10th) From St. Joseph’s Girl’s High School Year of passing: 2006 Percentage: 89.5% WORK EXPERIENCE:  Currently working in Tesco for IT Security Department as Operations Support.  Worked in Infosys. KEY COMPETENCIES  Efficient Proficient & Perfectionist  Capability to Meet Deadlines and Work under Pressure in a Fast Paced Atmosphere  Discretion and Understanding the Need for Confidentiality  Competence with Using Common Office Systems and Software  Hard Working and Detail - Oriented LANGUAGES KNOWN: ENGLISH - Read, write and speak with a neutral accent. Date: Yours Truly Place: Divya