SlideShare a Scribd company logo
1 of 5
Download to read offline
VIPIN GUPTA CEH, ISO 27001 LA, M.S. (Information Security from
IIIT-A)
Full Name: Vipin Kumar Gupta Mobile: (+91) 8376863262
Address: 61-D Sarai Julena, Email: ei.vipin12@gmail.com
New Friends Colony,
New Delhi, India.
CAREER OBJECTIVE
Aspiring to work with a growing organization in the field of Information Security that offers a
challenging environment where I can carve a niche for myself and effectively deliver towards
contributing to the organization’s target and aspiration.
EDUCATIONAL QUALIFICATION
Qualification University Graduating Year Percentage/CGPA
MS-CLIS IIIT Allahabad 2015 7.71
B.TECH GBTU 2012 67.84
Higher Secondary (12th
) ISC 2007 62
High School (10th
) ICSE 2005 60.4
PROFESSIONAL EXPERIENCE
• Organization: Sattrix Information Security Pvt. Ltd.
• Designation : Security Analyst – L2
• Duration: May 2015 to Present
• Roles and Responsibility :
1. ArcSight ESM :
 Providing SOC solutions to the clients.
 Handling the implementation of ArcSight tools at client side.
 Providing following support services to the client to manage their SOC.
o Integration of network devices with ArcSight.
o Creation of custom on demand rules/reports/dashboards.
o Monitoring Alerts triggering in ArcSight and update to the Manager and concerned
team members.
o Generating Reports for all the Devices.
o Preparing Adhoc reports based on the requirement.
o Backup of ArcSight configuration.
o Analyze attack trends.
o Coordination with the client's infrastructure management team once an alert is
generated by the SOC team to contain attack / to take short term preventive
measures along with:
o Forensics Analysis
o Root cause analysis & long term controls
o Co-ordinate for the SIEM system
o Managing configuration
o Correction of faults
o Managing backups, restore
o Periodic maintenance
o Coordinate with onsite customer team for trouble shooting of faults & problem
resolution
o Open a case with Hardware/device Supplier in the event of component or system
failure
o Open a case and coordinate with OEM to resolve bug fixes & patches
o Track AMC renewal dates with device supplier.
2. ArcSight Logger:
 Administration of ArcSight Logger and ArcSight Database.
 Administration of ArcSight Connector servers.
 Installation and fine tuning of Smart Connectors.
 Proactive monitoring of performance and Health check of ArcSight Logger and ArcSight
Database.
 Proactive monitoring of performance of ArcSight connectors.
 Configuring reports, Dashboards, Real-time Alerts for integrated devices.
 Monitor Alerts triggering in ArcSight and update to the Manager and concerned team members.
 Backup of ArcSight configuration.
 Generate Reports for all the Devices.
 Integrating devices with ArcSight.
 Prepare Ad hoc reports based on the requirement.
 Use cases rules to be configured or finetune.
 Vendor Coordination for issue troubleshooting.
 Patches are upgraded on regular basis and as and when released or informed by the OEM.
 Password change for all security devices managing.
CERTIFICATIONS & EMINENCE ACTIVITIES
 Certified Ethical Hacker (CEH V8) | Certificate Number: ECC45923448283
EC-Council
 ISO 27001 LA: 2013 | Certificate Number: ENR-00175996
BSI Academy | Certified by IRCA
 Published a research paper on Study of Recent Trends of Distributed Denial of
Service Attack in the International Journal IJCST
TRAINING / INTERNSHIP
Organization Summer internship in Cyber Cell Gurgaon Police
Project E-Commerce fraud and Investigation
Duration 6 Weeks
Description During this period our goal is to understand the phenomena different
Kinds of attacks using social engineering.
PROJECTS
Project Description: Security operation center (SOC) monitoring and incident handling.
The project includes the entire management of the security operations of the banking sector client.
Which have include the logging of the events related to all banking operations, monitoring of the
incidents, Alerting and reporting of the incidents, Root cause analysis of major/critical incident which
may have catastrophic impact on the critical banking operations.
Area of Expertise
 ArcSight Express
 ArcSight ESM
 ArcSight Logger
IT SKILLS
Penetration Testing : Metasploit, Nessus, Wireshark, Burp Suite, Netcat, Nmap, Cain & Abel
Operating Systems : Linux (Kali Linux, Fedora , Debian), Windows Server
Networking : Router , Switch , VPN, Firewall(Checkpoint), IDS/IPS
IT Security : UTM, IronPort Proxy, Syslog, SIEM, ArcSight Logger & ESM.
STRENGTH AND CURRICULAR ACTIVITY
 Taking Initiatives and Willingness to Learn: A quick learner with a work ethic bordering
on workaholic and a zeal for accepting difficult challenges.
 Organized CEH Certification at IIIT Allahabad in Jan 2015.
 Ability to manage and prioritize work for timely delivery.
 Good problem solving ability and analytic skill to solve the problem efficiently.
 Good team player and have excellent interaction skill to coordinate and work within a team.
 Certify B-cognizance for campus pulse.
PERSONAL DETAILS
 Date of Birth: 27/10/1989
 Gender : Male
 Marital status: Single
 Passport No: L84426130
 Nationality: Indian
 Languages known: English, Hindi
VIPIN_GUPTA_SECURITY_ANALYST
VIPIN_GUPTA_SECURITY_ANALYST

More Related Content

What's hot

Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitecturePriyanka Aash
 
Designing Virtual Network Security Architectures
Designing Virtual Network Security ArchitecturesDesigning Virtual Network Security Architectures
Designing Virtual Network Security ArchitecturesPriyanka Aash
 
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure SentinelMighty Guides, Inc.
 
20181206 sps geneve we are moving to the cloud what about security
20181206   sps geneve we are moving to the cloud what about security20181206   sps geneve we are moving to the cloud what about security
20181206 sps geneve we are moving to the cloud what about securityArjan Cornelissen
 
How VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskHow VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskCyxtera Technologies
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2rpark31
 
Sikkerhed & Compliance i en cloud-verden
Sikkerhed & Compliance i en cloud-verdenSikkerhed & Compliance i en cloud-verden
Sikkerhed & Compliance i en cloud-verdenMicrosoft
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMElasticsearch
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElasticsearch
 
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCEEASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCEAlex Himmelberg
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsUlf Mattsson
 
Cloud Breach – Preparation and Response
Cloud Breach – Preparation and ResponseCloud Breach – Preparation and Response
Cloud Breach – Preparation and ResponsePriyanka Aash
 
Patterns for Secure Containerized Applications (Docker)
Patterns for Secure Containerized Applications (Docker)Patterns for Secure Containerized Applications (Docker)
Patterns for Secure Containerized Applications (Docker)Erica Windisch
 
Identity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of ThingsIdentity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of ThingsPriyanka Aash
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That WorksBrett L. Scott
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesDr. Rajesh P Barnwal
 
Operacionalize com alerta, dashboards customizados e linhas do tempo
Operacionalize com alerta, dashboards customizados e linhas do tempoOperacionalize com alerta, dashboards customizados e linhas do tempo
Operacionalize com alerta, dashboards customizados e linhas do tempoElasticsearch
 
Software-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and RightSoftware-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and RightSBWebinars
 

What's hot (20)

Take It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security ArchitectureTake It to the Cloud: The Evolution of Security Architecture
Take It to the Cloud: The Evolution of Security Architecture
 
Designing Virtual Network Security Architectures
Designing Virtual Network Security ArchitecturesDesigning Virtual Network Security Architectures
Designing Virtual Network Security Architectures
 
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel
 
20181206 sps geneve we are moving to the cloud what about security
20181206   sps geneve we are moving to the cloud what about security20181206   sps geneve we are moving to the cloud what about security
20181206 sps geneve we are moving to the cloud what about security
 
How VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskHow VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at Risk
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
 
Sikkerhed & Compliance i en cloud-verden
Sikkerhed & Compliance i en cloud-verdenSikkerhed & Compliance i en cloud-verden
Sikkerhed & Compliance i en cloud-verden
 
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEMUpgrade Your SOC with Cortex XSOAR & Elastic SIEM
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
 
Limitless xdr meetup
Limitless xdr meetupLimitless xdr meetup
Limitless xdr meetup
 
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCEEASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCE
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps
 
Cloud Breach – Preparation and Response
Cloud Breach – Preparation and ResponseCloud Breach – Preparation and Response
Cloud Breach – Preparation and Response
 
Patterns for Secure Containerized Applications (Docker)
Patterns for Secure Containerized Applications (Docker)Patterns for Secure Containerized Applications (Docker)
Patterns for Secure Containerized Applications (Docker)
 
Identity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of ThingsIdentity-Based Security and Privacy for the Internet of Things
Identity-Based Security and Privacy for the Internet of Things
 
Proactive Security That Works
Proactive Security That WorksProactive Security That Works
Proactive Security That Works
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research Challenges
 
Operacionalize com alerta, dashboards customizados e linhas do tempo
Operacionalize com alerta, dashboards customizados e linhas do tempoOperacionalize com alerta, dashboards customizados e linhas do tempo
Operacionalize com alerta, dashboards customizados e linhas do tempo
 
Software-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and RightSoftware-Defined Segmentation Done Easily, Quickly and Right
Software-Defined Segmentation Done Easily, Quickly and Right
 

Viewers also liked (13)

IT Security Resume 2015
IT Security Resume 2015IT Security Resume 2015
IT Security Resume 2015
 
pandi.resume (1)
pandi.resume (1)pandi.resume (1)
pandi.resume (1)
 
Swapnil Goud Tadkal
Swapnil Goud TadkalSwapnil Goud Tadkal
Swapnil Goud Tadkal
 
Hemant_Experience
Hemant_ExperienceHemant_Experience
Hemant_Experience
 
Presentacion demo mc afee siem
Presentacion demo mc afee siemPresentacion demo mc afee siem
Presentacion demo mc afee siem
 
Mohammad Tahir_CV
Mohammad Tahir_CVMohammad Tahir_CV
Mohammad Tahir_CV
 
Ambrish keshari resume
Ambrish keshari  resumeAmbrish keshari  resume
Ambrish keshari resume
 
Clinton Resume
Clinton ResumeClinton Resume
Clinton Resume
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
 
Mohini_experience
Mohini_experienceMohini_experience
Mohini_experience
 
Devasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar Mahato - Resume
Devasis Kumar Mahato - Resume
 
Rajesh Gurunathan - Network security & Arcsight
Rajesh Gurunathan - Network security & ArcsightRajesh Gurunathan - Network security & Arcsight
Rajesh Gurunathan - Network security & Arcsight
 
Resume recent-b
Resume recent-bResume recent-b
Resume recent-b
 

Similar to VIPIN_GUPTA_SECURITY_ANALYST

Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Sambit kumar nayak resume
Sambit kumar nayak resumeSambit kumar nayak resume
Sambit kumar nayak resumeSambit Nayak
 
Ajith H N-Profile
Ajith H N-ProfileAjith H N-Profile
Ajith H N-ProfileAjith H N
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security SessionSplunk
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn Kingsley
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)Abhishek Sa
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updatedSantos Kumaar.S
 
AWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSAWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSEric Smalling
 
BasavarajPatil_Java_Agile_PM
BasavarajPatil_Java_Agile_PMBasavarajPatil_Java_Agile_PM
BasavarajPatil_Java_Agile_PMBasavaraj Patil
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResumeNadia Pryadko
 

Similar to VIPIN_GUPTA_SECURITY_ANALYST (20)

Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Shashikant Chavan_Resume
Shashikant Chavan_ResumeShashikant Chavan_Resume
Shashikant Chavan_Resume
 
Sambit kumar nayak resume
Sambit kumar nayak resumeSambit kumar nayak resume
Sambit kumar nayak resume
 
Ajith H N-Profile
Ajith H N-ProfileAjith H N-Profile
Ajith H N-Profile
 
tarunidhar
tarunidhartarunidhar
tarunidhar
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)
 
Resume-thilaga
Resume-thilagaResume-thilaga
Resume-thilaga
 
Dinesh_Resume
Dinesh_ResumeDinesh_Resume
Dinesh_Resume
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
 
AWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSAWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWS
 
BasavarajPatil_Java_Agile_PM
BasavarajPatil_Java_Agile_PMBasavarajPatil_Java_Agile_PM
BasavarajPatil_Java_Agile_PM
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
HEENA ARORA
HEENA ARORAHEENA ARORA
HEENA ARORA
 
S4x20 Forescout Presentation
S4x20 Forescout Presentation S4x20 Forescout Presentation
S4x20 Forescout Presentation
 
NPryadko-LinkedInResume
NPryadko-LinkedInResumeNPryadko-LinkedInResume
NPryadko-LinkedInResume
 
Resume (6)
Resume (6)Resume (6)
Resume (6)
 

VIPIN_GUPTA_SECURITY_ANALYST

  • 1. VIPIN GUPTA CEH, ISO 27001 LA, M.S. (Information Security from IIIT-A) Full Name: Vipin Kumar Gupta Mobile: (+91) 8376863262 Address: 61-D Sarai Julena, Email: ei.vipin12@gmail.com New Friends Colony, New Delhi, India. CAREER OBJECTIVE Aspiring to work with a growing organization in the field of Information Security that offers a challenging environment where I can carve a niche for myself and effectively deliver towards contributing to the organization’s target and aspiration. EDUCATIONAL QUALIFICATION Qualification University Graduating Year Percentage/CGPA MS-CLIS IIIT Allahabad 2015 7.71 B.TECH GBTU 2012 67.84 Higher Secondary (12th ) ISC 2007 62 High School (10th ) ICSE 2005 60.4 PROFESSIONAL EXPERIENCE • Organization: Sattrix Information Security Pvt. Ltd. • Designation : Security Analyst – L2 • Duration: May 2015 to Present • Roles and Responsibility : 1. ArcSight ESM :  Providing SOC solutions to the clients.  Handling the implementation of ArcSight tools at client side.  Providing following support services to the client to manage their SOC. o Integration of network devices with ArcSight. o Creation of custom on demand rules/reports/dashboards. o Monitoring Alerts triggering in ArcSight and update to the Manager and concerned team members. o Generating Reports for all the Devices. o Preparing Adhoc reports based on the requirement. o Backup of ArcSight configuration. o Analyze attack trends. o Coordination with the client's infrastructure management team once an alert is generated by the SOC team to contain attack / to take short term preventive measures along with:
  • 2. o Forensics Analysis o Root cause analysis & long term controls o Co-ordinate for the SIEM system o Managing configuration o Correction of faults o Managing backups, restore o Periodic maintenance o Coordinate with onsite customer team for trouble shooting of faults & problem resolution o Open a case with Hardware/device Supplier in the event of component or system failure o Open a case and coordinate with OEM to resolve bug fixes & patches o Track AMC renewal dates with device supplier. 2. ArcSight Logger:  Administration of ArcSight Logger and ArcSight Database.  Administration of ArcSight Connector servers.  Installation and fine tuning of Smart Connectors.  Proactive monitoring of performance and Health check of ArcSight Logger and ArcSight Database.  Proactive monitoring of performance of ArcSight connectors.  Configuring reports, Dashboards, Real-time Alerts for integrated devices.  Monitor Alerts triggering in ArcSight and update to the Manager and concerned team members.  Backup of ArcSight configuration.  Generate Reports for all the Devices.  Integrating devices with ArcSight.  Prepare Ad hoc reports based on the requirement.  Use cases rules to be configured or finetune.  Vendor Coordination for issue troubleshooting.  Patches are upgraded on regular basis and as and when released or informed by the OEM.  Password change for all security devices managing. CERTIFICATIONS & EMINENCE ACTIVITIES  Certified Ethical Hacker (CEH V8) | Certificate Number: ECC45923448283 EC-Council  ISO 27001 LA: 2013 | Certificate Number: ENR-00175996 BSI Academy | Certified by IRCA  Published a research paper on Study of Recent Trends of Distributed Denial of Service Attack in the International Journal IJCST TRAINING / INTERNSHIP Organization Summer internship in Cyber Cell Gurgaon Police Project E-Commerce fraud and Investigation Duration 6 Weeks Description During this period our goal is to understand the phenomena different Kinds of attacks using social engineering.
  • 3. PROJECTS Project Description: Security operation center (SOC) monitoring and incident handling. The project includes the entire management of the security operations of the banking sector client. Which have include the logging of the events related to all banking operations, monitoring of the incidents, Alerting and reporting of the incidents, Root cause analysis of major/critical incident which may have catastrophic impact on the critical banking operations. Area of Expertise  ArcSight Express  ArcSight ESM  ArcSight Logger IT SKILLS Penetration Testing : Metasploit, Nessus, Wireshark, Burp Suite, Netcat, Nmap, Cain & Abel Operating Systems : Linux (Kali Linux, Fedora , Debian), Windows Server Networking : Router , Switch , VPN, Firewall(Checkpoint), IDS/IPS IT Security : UTM, IronPort Proxy, Syslog, SIEM, ArcSight Logger & ESM. STRENGTH AND CURRICULAR ACTIVITY  Taking Initiatives and Willingness to Learn: A quick learner with a work ethic bordering on workaholic and a zeal for accepting difficult challenges.  Organized CEH Certification at IIIT Allahabad in Jan 2015.  Ability to manage and prioritize work for timely delivery.  Good problem solving ability and analytic skill to solve the problem efficiently.  Good team player and have excellent interaction skill to coordinate and work within a team.  Certify B-cognizance for campus pulse. PERSONAL DETAILS  Date of Birth: 27/10/1989  Gender : Male  Marital status: Single  Passport No: L84426130  Nationality: Indian  Languages known: English, Hindi