SlideShare a Scribd company logo
1 of 3
CURRICULUM VITAE
Varsharani. K- Capgemini Bangalore
Information Security Analyst
Mobile No: +91-8970630049
Email ID:varsharanikallimath03@gmail.com
 Objective:
To be a successful Software Engineer by keeping abreast with latest technical advancement in the field of
Information Technology that will enable me to offer the best of my technical and personal abilities.
 ProfessionalSummary:
 Having 2 years of experience in SIEM, Symantec and Vulnerability Management.
 Having experience in IBM Q-Radar, Alien vault SIEM tools and also Symantec Endpoint protection.
And also having good knowledge on the complete architecture of Q-Radar.
 Analyzing the logs by using IBM Q-Radar.
 Monitoring the health of Qradar.
 Analyzing the logs which are triggered in Qradar and providing the recommendations to the
technical teams.
 Having hands on experience on Symantec Endpoint Protection Manager.
 Having hands on experience with Qualys Guard Vulnerability Management tool.
 Having experience in scanning the Networks and providing the Scan report to the technical teams.
And analyzing the scan report and provide the recommendations to technical teams.
 ProfessionalExperience :
 Currently working with CAPGEMINI India Pvt Ltd. (Bangalore) as an Information Security
Analyst from Sept 2014 to till date
 Certification:
 Having certification in CERTFIED ETHICAL HACKING (CEH) from EC-Council.
 EducationalQualification:
 Bachelor of Technology (B.Tech) with ECE specialization from Visvesvaraya Technological
University Belgaum( Karnataka) (VTU)
 IT Skill Set:
 Tools : HP Tipping Point IPS, IBM Q-radar, Qualys Guard, Symantec, Alien
vault.
 Ticketing tools : Remedy, Snow
 Packages : MS Office 97/2007/2010.
 Operating Systems : Windows XP/7/8/10
 ProjectDetails:
Vulnerability Management:
Client : WARNER BROTHERS
Duration : January 2015 till date
Project : Security Operation Center
Role : Team member
Environment : Vulnerability Management (Qualys Guard)
Description : An American based Entertainment Company that produces film, television and
music entertainment. As one of the major film studios, it is a subsidiary of Time Warner, with its
headquarters in Burbank, California. The project deals with the Security Operations Center
(Vulnerability Management) which provides high level Security to the Servers and workstations
which are present in the WB environment.
Responsibilities:
 Scan the networks and fetch the report using Qualys Guard.
 In the report based upon the operating system and vulnerabilities need to segregate the report and
provide the report to concern technical teams for remediation.
 Analyze the scan report and providing the recommendations and risk assessments to technical teams
based on severity.
 Following up with the technical teams to make sure the vendor patches are updated on the vulnerable
systems.
 Adding or removing the assets into or from the network environment.
 Preparing the weekly and monthly dashboards for the remediation status.
 Providing the GSOC recommendations for the Zero day attacks.
SIEM & Symantec:
Client : Skysight
Duration : Sep 2014 to till date
Project : Security Operations Center
Role : Team member
Environment : IBM Q-Radar & Symantec
Description : This is the internal Capgemini project. The project deals with the Group ITICS
which is a Time sheet application in France. This is the internal to the all the Capgemini users in
France. The project deals with the Security Operations Center (IBM Q-Radar, Symantec & BMC
Remediation tool) which provides high level Security to the Data centers which are present in the
environment. We need to monitor the SIEM logs.
Responsibilities:
 To monitor the Qradar health.
 Identify the specious events and vulnerabilities based upon filters.
 Monitor Symantec Endpoint protection for outdated, Offline, disabled and troubleshooting of
servers.
 Download the logs from Q-Radar and analyzing the logs and identify the specious activities.
 Creating incidents in ITSM.
 Notify the Network, Platform team for necessary action.
 PersonalDetails:
 Name : Varsharani. K. Kallimath
 Date of Birth : 03/09/1991
 Father's Name : Kallayya. P. Kallimath
 Permanent Address : Param Parvati Nivas, A/P Ghataprabha, Tq: Gokak, Dist: Belgaum,
Karnataka-591306
 Declaration:
I hereby declare that the particulars of information furnished above are true to the best of my knowledge and
belief.
Place :Bangalore (Varsharani. K)

More Related Content

What's hot

A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlSymantec
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecuritySymantec
 
Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabSyed Ubaid Ali Jafri
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...Symantec
 
Cyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsDavid Sweigert
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopDavid Sweigert
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...Edureka!
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14Aventis Systems, Inc.
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksIvanti
 

What's hot (20)

A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
Checkpoint ccsa r76
Checkpoint ccsa r76Checkpoint ccsa r76
Checkpoint ccsa r76
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
 
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device ControlStop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
 
IKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet ENIKare Vulnerability Scanner - Datasheet EN
IKare Vulnerability Scanner - Datasheet EN
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
 
Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
TECHNICAL BRIEF: Using Symantec Endpoint Protection 12.1 to Protect Against A...
 
Cyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber Criminals
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certifica...
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14The Importance of Endpoint Protection - Featuring SEP 14
The Importance of Endpoint Protection - Featuring SEP 14
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 

Similar to Resume - Varsharani

resume _jayendra Kadam
resume _jayendra Kadamresume _jayendra Kadam
resume _jayendra KadamJayendra Kadam
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPSymantec
 
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptxContainer Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptxMandy Sidana
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíMarketingArrowECS_CZ
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPSmmiznoni
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)Abhishek Sa
 
VIPIN_GUPTA_SECURITY_ANALYST
VIPIN_GUPTA_SECURITY_ANALYSTVIPIN_GUPTA_SECURITY_ANALYST
VIPIN_GUPTA_SECURITY_ANALYSTVIPIN KUMAR GUPTA
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...IBM Security
 
Threat Modeling Web Applications
Threat Modeling Web ApplicationsThreat Modeling Web Applications
Threat Modeling Web ApplicationsNadia BENCHIKHA
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat managementRajendra Menon
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 

Similar to Resume - Varsharani (20)

resume _jayendra Kadam
resume _jayendra Kadamresume _jayendra Kadam
resume _jayendra Kadam
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATP
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
 
Imran Resume
Imran ResumeImran Resume
Imran Resume
 
kapil mehandiratta_CV
kapil mehandiratta_CVkapil mehandiratta_CV
kapil mehandiratta_CV
 
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptxContainer Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptx
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Continuous security
Continuous securityContinuous security
Continuous security
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)
 
VIPIN_GUPTA_SECURITY_ANALYST
VIPIN_GUPTA_SECURITY_ANALYSTVIPIN_GUPTA_SECURITY_ANALYST
VIPIN_GUPTA_SECURITY_ANALYST
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
 
Threat Modeling Web Applications
Threat Modeling Web ApplicationsThreat Modeling Web Applications
Threat Modeling Web Applications
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 

Resume - Varsharani

  • 1. CURRICULUM VITAE Varsharani. K- Capgemini Bangalore Information Security Analyst Mobile No: +91-8970630049 Email ID:varsharanikallimath03@gmail.com  Objective: To be a successful Software Engineer by keeping abreast with latest technical advancement in the field of Information Technology that will enable me to offer the best of my technical and personal abilities.  ProfessionalSummary:  Having 2 years of experience in SIEM, Symantec and Vulnerability Management.  Having experience in IBM Q-Radar, Alien vault SIEM tools and also Symantec Endpoint protection. And also having good knowledge on the complete architecture of Q-Radar.  Analyzing the logs by using IBM Q-Radar.  Monitoring the health of Qradar.  Analyzing the logs which are triggered in Qradar and providing the recommendations to the technical teams.  Having hands on experience on Symantec Endpoint Protection Manager.  Having hands on experience with Qualys Guard Vulnerability Management tool.  Having experience in scanning the Networks and providing the Scan report to the technical teams. And analyzing the scan report and provide the recommendations to technical teams.  ProfessionalExperience :  Currently working with CAPGEMINI India Pvt Ltd. (Bangalore) as an Information Security Analyst from Sept 2014 to till date  Certification:  Having certification in CERTFIED ETHICAL HACKING (CEH) from EC-Council.  EducationalQualification:  Bachelor of Technology (B.Tech) with ECE specialization from Visvesvaraya Technological University Belgaum( Karnataka) (VTU)
  • 2.  IT Skill Set:  Tools : HP Tipping Point IPS, IBM Q-radar, Qualys Guard, Symantec, Alien vault.  Ticketing tools : Remedy, Snow  Packages : MS Office 97/2007/2010.  Operating Systems : Windows XP/7/8/10  ProjectDetails: Vulnerability Management: Client : WARNER BROTHERS Duration : January 2015 till date Project : Security Operation Center Role : Team member Environment : Vulnerability Management (Qualys Guard) Description : An American based Entertainment Company that produces film, television and music entertainment. As one of the major film studios, it is a subsidiary of Time Warner, with its headquarters in Burbank, California. The project deals with the Security Operations Center (Vulnerability Management) which provides high level Security to the Servers and workstations which are present in the WB environment. Responsibilities:  Scan the networks and fetch the report using Qualys Guard.  In the report based upon the operating system and vulnerabilities need to segregate the report and provide the report to concern technical teams for remediation.  Analyze the scan report and providing the recommendations and risk assessments to technical teams based on severity.  Following up with the technical teams to make sure the vendor patches are updated on the vulnerable systems.  Adding or removing the assets into or from the network environment.  Preparing the weekly and monthly dashboards for the remediation status.  Providing the GSOC recommendations for the Zero day attacks.
  • 3. SIEM & Symantec: Client : Skysight Duration : Sep 2014 to till date Project : Security Operations Center Role : Team member Environment : IBM Q-Radar & Symantec Description : This is the internal Capgemini project. The project deals with the Group ITICS which is a Time sheet application in France. This is the internal to the all the Capgemini users in France. The project deals with the Security Operations Center (IBM Q-Radar, Symantec & BMC Remediation tool) which provides high level Security to the Data centers which are present in the environment. We need to monitor the SIEM logs. Responsibilities:  To monitor the Qradar health.  Identify the specious events and vulnerabilities based upon filters.  Monitor Symantec Endpoint protection for outdated, Offline, disabled and troubleshooting of servers.  Download the logs from Q-Radar and analyzing the logs and identify the specious activities.  Creating incidents in ITSM.  Notify the Network, Platform team for necessary action.  PersonalDetails:  Name : Varsharani. K. Kallimath  Date of Birth : 03/09/1991  Father's Name : Kallayya. P. Kallimath  Permanent Address : Param Parvati Nivas, A/P Ghataprabha, Tq: Gokak, Dist: Belgaum, Karnataka-591306  Declaration: I hereby declare that the particulars of information furnished above are true to the best of my knowledge and belief. Place :Bangalore (Varsharani. K)