SlideShare a Scribd company logo
DEEPIKA SIVARAJ
5310 Abercorn Avenue,
Atlanta Georgia - 30346
Phone: 808-725-4707
dipicaa@gmail.com
A technically strong and skilled Information Security Analyst with expertise in risk management,
unauthorized access, viruses and a wide range of Vulnerabilities and threats. Possess excellent technical
knowledge, communication skills and enthusiasm to learn new technologies. Have In-depth knowledge
in Security tools, technologies related to SIEM, Vulnerability Assessment, Antivirus, Firewall and Cyber
Security and its best practices with 4.10 years of professional IT experience as Information Security
Analyst.
OBJECTIVE: To proactively administer the growing Security needs, demands and challenges of the
industry by keeping me abreast in my field of work.
CERTIFICATIONS:
CCNA Cisco Certified Network administrator
CEH v8 Certified Ethical Hacking
ITIL V3 Information Technology Infrastructure Library
TECHNOLOGY:
SIEM: IBM-Qradar, NetForensics
Vulnerability Management: QualysGuard, McAfee Foundstone
Antivirus: McAfee ePO 4.5,4.6 & 5.0 SEP 11.0 and 12.0
Ethical Hacking: nMAP, Aircrack, Wireshark
Networking: Basic of Cisco ASA firewall and concepts of VPN, IDS/IPS, HIPS.
EDUCATION:
Bachelor of Engineering in Electronics and Communication Year: 2010
PROFESSIONAL EXPERIENCE:
Designation: Senior Security Analyst
Company: Azimetry Inc
Client : Time Warner (Oct 2015- Till date)
Experience: April 2015 – Till date
Roles & Activities:
• Technical experience including incident response, forensic investigation, risk analysis, business
continuity planning, regulatory compliance, vulnerability assessments, threat management,
corporate security policies.
• Conducted Vulnerability Assessment using QualysGuard to evaluate attack vectors, identified
system vulnerabilities and developed remediation plans and security procedures.
• Managing the assets in the network and creating asset groups based on OS and network
devices.
• Creating map scan to identify the rogue devices in the network.
• Creating scheduled scans and option profile according the network in Qualys.
• Performed infrastructure vulnerability management on corporate and PCI, SOX scoped
production devices providing remediation plans and risk mitigation strategies.
• Extract the logs, perform real time log analysis using Q-Radar SIEM and Forensics Analysis of logs
as per the request.
• Monitoring and analyzing Offenses on IBM Q-Radar Security Incident and Event Management on
a regular basis and giving the result of the investigation to the remediation team.
• Create and document reports, rules and Dashboard in SIEM.
• Fine tuning the rules and creating building blocks to reduce false positive offenses in Q-Radar.
• Manual log source creation in case log source in not auto discovered.
• Aggregate, correlate, and analyze log data from network devices, security devices and other key
assets using Qradar SIEM.
Designation: Senior Operations Professional
Company: IBM
Experience: Aug 2012- Aug 2014
Roles & Activities:
• Prepare weekly and monthly security vulnerability reports using McAfee Foundstone and
highlighting the risk.
• Security Incident handling, SIEM using netForensics.
• Installing the agent to collect the logs from network devices and forward it to nFX.
• Design and implement Antivirus infrastructure for small, medium and large network.
• Installing and configuring McAfee ePolicy orchestrator and distributed repository servers.
• Up-gradation of ePO from 4.0 to 4.5 and 4.6
• Provided first response to contain virus outbreaks and other attacks.
• Administration of client groups, create and manage AV policies according to the security
requirement.
• Custom report creation and alert configuration based on client requirements in ePO console
• Perform disaster recovery process during critical situation of patch update/up-grading the ePO
• Creating and managing policies in McAfee SiteAdvisor 3.5
• Discover and manage unidentified devices on the network using McAfee Rogue System
Detection Sensor.
• Performed migration from SEP 11 to SEP 12.
• Managing and configuring Firewall rules, IDS & IPS policies in SEP.
Designation: Analyst
Company: HCL Comnet
Experience: July 2010-Aug 2012
Roles & Activities:
• Configuring and monitor all enterprise antivirus operations, schedule virus detection sweeps.
• Installation and up-gradation of McAfee ePO in the existing environment. ( ePO 4.0,4.5 and 4.6)
• Design and manage custom remote site with detailed end-user instructions and schedule for
manual and automated DAT file update procedures.
• Identify risks, recommend corrective measures and ensure the adequacy of existing information
security controls.
• Commended for technical, analytical and problem-solving skills; and customer service
orientation.
• Provide technical support and day to day administration of Cisco ASA firewall.

More Related Content

What's hot

Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Symantec
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
AlienVault
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
AlienVault
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
AlienVault
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?
Ryan G. Murphy
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?
Priyanka Aash
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
MarketingArrowECS_CZ
 
Advanced Threat Protection
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat Protection
Lan & Wan Solutions
 
Hide and seek - Attack Surface Management and continuous assessment.
Hide and seek - Attack Surface Management and continuous assessment.Hide and seek - Attack Surface Management and continuous assessment.
Hide and seek - Attack Surface Management and continuous assessment.
Eoin Keary
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
NormShield, Inc.
 
TSS - App Penetration Testing Services
TSS - App Penetration Testing ServicesTSS - App Penetration Testing Services
TSS - App Penetration Testing Services
Ahmad Sharaf
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
xband
 
Outpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface managementOutpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface management
Outpost24
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides final
AlienVault
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!
NormShield, Inc.
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield, Inc.
 
Prabhu Resume
Prabhu ResumePrabhu Resume
Prabhu ResumePrabhu P
 
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload ProtectionReducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Alert Logic
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Alert Logic
 

What's hot (20)

Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
Advanced Threat Protection
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat Protection
 
Hide and seek - Attack Surface Management and continuous assessment.
Hide and seek - Attack Surface Management and continuous assessment.Hide and seek - Attack Surface Management and continuous assessment.
Hide and seek - Attack Surface Management and continuous assessment.
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
 
TSS - App Penetration Testing Services
TSS - App Penetration Testing ServicesTSS - App Penetration Testing Services
TSS - App Penetration Testing Services
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Outpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface managementOutpost24 webinar: best practice for external attack surface management
Outpost24 webinar: best practice for external attack surface management
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides final
 
3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!3rd Party Cyber Security: Manage your ecosystem!
3rd Party Cyber Security: Manage your ecosystem!
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration Overview
 
Prabhu Resume
Prabhu ResumePrabhu Resume
Prabhu Resume
 
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload ProtectionReducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
 

Viewers also liked

2016 Shawna Ley Resume Revised 2
2016 Shawna Ley Resume Revised 22016 Shawna Ley Resume Revised 2
2016 Shawna Ley Resume Revised 2Shawna Ley
 
006 מיוחד 2007
006 מיוחד 2007006 מיוחד 2007
006 מיוחד 2007
bagrutonline
 
PitchPerfect Certificate
PitchPerfect CertificatePitchPerfect Certificate
PitchPerfect CertificateJohn Hooberman
 
I love flowers A Presentation By Mr Allah Dad Khan Visiting Professor Agricul...
I love flowers A Presentation By Mr Allah Dad Khan Visiting Professor Agricul...I love flowers A Presentation By Mr Allah Dad Khan Visiting Professor Agricul...
I love flowers A Presentation By Mr Allah Dad Khan Visiting Professor Agricul...
Mr.Allah Dad Khan
 
сохранить фараона
сохранить фараонасохранить фараона
сохранить фараона
Vladislav Pak
 
Project Based Learning
Project Based LearningProject Based Learning
Project Based Learning
tomblin47
 
(EOR/MEOR/BERO/oil recovery)Application of bero™ biosurfactant in pucheng oil...
(EOR/MEOR/BERO/oil recovery)Application of bero™ biosurfactant in pucheng oil...(EOR/MEOR/BERO/oil recovery)Application of bero™ biosurfactant in pucheng oil...
(EOR/MEOR/BERO/oil recovery)Application of bero™ biosurfactant in pucheng oil...
Matt Wu
 
FIN DE AÑO
FIN DE AÑOFIN DE AÑO
FIN DE AÑO
gustavogonzalez929
 
Презентация "1С:Управление небольшой фирмой. Новое в версии 1.6.1"
Презентация "1С:Управление небольшой фирмой. Новое в версии 1.6.1"Презентация "1С:Управление небольшой фирмой. Новое в версии 1.6.1"
Презентация "1С:Управление небольшой фирмой. Новое в версии 1.6.1"
Iuliia Usatiuk
 
днк лимфоцитов у больных хроническим гепатитом с
днк лимфоцитов у больных хроническим гепатитом сднк лимфоцитов у больных хроническим гепатитом с
днк лимфоцитов у больных хроническим гепатитом с
Vladislav Pak
 
Interaction of Arbidopsis thaliana or Plasmodiophora brassicae
Interaction of Arbidopsis thaliana or Plasmodiophora brassicaeInteraction of Arbidopsis thaliana or Plasmodiophora brassicae
Interaction of Arbidopsis thaliana or Plasmodiophora brassicae
Swatiraj Tyagi
 

Viewers also liked (11)

2016 Shawna Ley Resume Revised 2
2016 Shawna Ley Resume Revised 22016 Shawna Ley Resume Revised 2
2016 Shawna Ley Resume Revised 2
 
006 מיוחד 2007
006 מיוחד 2007006 מיוחד 2007
006 מיוחד 2007
 
PitchPerfect Certificate
PitchPerfect CertificatePitchPerfect Certificate
PitchPerfect Certificate
 
I love flowers A Presentation By Mr Allah Dad Khan Visiting Professor Agricul...
I love flowers A Presentation By Mr Allah Dad Khan Visiting Professor Agricul...I love flowers A Presentation By Mr Allah Dad Khan Visiting Professor Agricul...
I love flowers A Presentation By Mr Allah Dad Khan Visiting Professor Agricul...
 
сохранить фараона
сохранить фараонасохранить фараона
сохранить фараона
 
Project Based Learning
Project Based LearningProject Based Learning
Project Based Learning
 
(EOR/MEOR/BERO/oil recovery)Application of bero™ biosurfactant in pucheng oil...
(EOR/MEOR/BERO/oil recovery)Application of bero™ biosurfactant in pucheng oil...(EOR/MEOR/BERO/oil recovery)Application of bero™ biosurfactant in pucheng oil...
(EOR/MEOR/BERO/oil recovery)Application of bero™ biosurfactant in pucheng oil...
 
FIN DE AÑO
FIN DE AÑOFIN DE AÑO
FIN DE AÑO
 
Презентация "1С:Управление небольшой фирмой. Новое в версии 1.6.1"
Презентация "1С:Управление небольшой фирмой. Новое в версии 1.6.1"Презентация "1С:Управление небольшой фирмой. Новое в версии 1.6.1"
Презентация "1С:Управление небольшой фирмой. Новое в версии 1.6.1"
 
днк лимфоцитов у больных хроническим гепатитом с
днк лимфоцитов у больных хроническим гепатитом сднк лимфоцитов у больных хроническим гепатитом с
днк лимфоцитов у больных хроническим гепатитом с
 
Interaction of Arbidopsis thaliana or Plasmodiophora brassicae
Interaction of Arbidopsis thaliana or Plasmodiophora brassicaeInteraction of Arbidopsis thaliana or Plasmodiophora brassicae
Interaction of Arbidopsis thaliana or Plasmodiophora brassicae
 

Similar to Deepika_Resume

Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
Splunk
 
Managed security services
Managed security servicesManaged security services
Managed security services
manoharparakh
 
241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_finalAnthony Hopkins
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
S4x20 Forescout Presentation
S4x20 Forescout Presentation S4x20 Forescout Presentation
S4x20 Forescout Presentation
Brian Proctor - GICSP, CISSP, CRISC
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016Adel Zayed
 
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEMGet Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Rapid7
 
Brian_Starr_Resume
Brian_Starr_ResumeBrian_Starr_Resume
Brian_Starr_ResumeBrian Starr
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Salil Kumar Subramony
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
Vijay Νavgire
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey Smith
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
Camilo Fandiño Gómez
 
Owasp masvs spain 17
Owasp masvs spain 17Owasp masvs spain 17
Owasp masvs spain 17
Luis A. Solís
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
New Horizons Computer Learning Centers / 5PE
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 

Similar to Deepika_Resume (20)

Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final241_ATD_TUE_1430_EagleRockEnergy_final
241_ATD_TUE_1430_EagleRockEnergy_final
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
 
S4x20 Forescout Presentation
S4x20 Forescout Presentation S4x20 Forescout Presentation
S4x20 Forescout Presentation
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016
 
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEMGet Real-Time Cyber Threat Protection with Risk Management and SIEM
Get Real-Time Cyber Threat Protection with Risk Management and SIEM
 
Brian_Starr_Resume
Brian_Starr_ResumeBrian_Starr_Resume
Brian_Starr_Resume
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green MethodSecure Code review - Veracode SaaS Platform - Saudi Green Method
Secure Code review - Veracode SaaS Platform - Saudi Green Method
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015Michael Jones-Resume-OCT2015
Michael Jones-Resume-OCT2015
 
Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016Jeffrey_Smith_Resume_2016
Jeffrey_Smith_Resume_2016
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Owasp masvs spain 17
Owasp masvs spain 17Owasp masvs spain 17
Owasp masvs spain 17
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 

Deepika_Resume

  • 1. DEEPIKA SIVARAJ 5310 Abercorn Avenue, Atlanta Georgia - 30346 Phone: 808-725-4707 dipicaa@gmail.com A technically strong and skilled Information Security Analyst with expertise in risk management, unauthorized access, viruses and a wide range of Vulnerabilities and threats. Possess excellent technical knowledge, communication skills and enthusiasm to learn new technologies. Have In-depth knowledge in Security tools, technologies related to SIEM, Vulnerability Assessment, Antivirus, Firewall and Cyber Security and its best practices with 4.10 years of professional IT experience as Information Security Analyst. OBJECTIVE: To proactively administer the growing Security needs, demands and challenges of the industry by keeping me abreast in my field of work. CERTIFICATIONS: CCNA Cisco Certified Network administrator CEH v8 Certified Ethical Hacking ITIL V3 Information Technology Infrastructure Library TECHNOLOGY: SIEM: IBM-Qradar, NetForensics Vulnerability Management: QualysGuard, McAfee Foundstone Antivirus: McAfee ePO 4.5,4.6 & 5.0 SEP 11.0 and 12.0 Ethical Hacking: nMAP, Aircrack, Wireshark
  • 2. Networking: Basic of Cisco ASA firewall and concepts of VPN, IDS/IPS, HIPS. EDUCATION: Bachelor of Engineering in Electronics and Communication Year: 2010 PROFESSIONAL EXPERIENCE: Designation: Senior Security Analyst Company: Azimetry Inc Client : Time Warner (Oct 2015- Till date) Experience: April 2015 – Till date Roles & Activities: • Technical experience including incident response, forensic investigation, risk analysis, business continuity planning, regulatory compliance, vulnerability assessments, threat management, corporate security policies. • Conducted Vulnerability Assessment using QualysGuard to evaluate attack vectors, identified system vulnerabilities and developed remediation plans and security procedures. • Managing the assets in the network and creating asset groups based on OS and network devices. • Creating map scan to identify the rogue devices in the network. • Creating scheduled scans and option profile according the network in Qualys. • Performed infrastructure vulnerability management on corporate and PCI, SOX scoped production devices providing remediation plans and risk mitigation strategies. • Extract the logs, perform real time log analysis using Q-Radar SIEM and Forensics Analysis of logs as per the request. • Monitoring and analyzing Offenses on IBM Q-Radar Security Incident and Event Management on a regular basis and giving the result of the investigation to the remediation team. • Create and document reports, rules and Dashboard in SIEM. • Fine tuning the rules and creating building blocks to reduce false positive offenses in Q-Radar. • Manual log source creation in case log source in not auto discovered.
  • 3. • Aggregate, correlate, and analyze log data from network devices, security devices and other key assets using Qradar SIEM. Designation: Senior Operations Professional Company: IBM Experience: Aug 2012- Aug 2014 Roles & Activities: • Prepare weekly and monthly security vulnerability reports using McAfee Foundstone and highlighting the risk. • Security Incident handling, SIEM using netForensics. • Installing the agent to collect the logs from network devices and forward it to nFX. • Design and implement Antivirus infrastructure for small, medium and large network. • Installing and configuring McAfee ePolicy orchestrator and distributed repository servers. • Up-gradation of ePO from 4.0 to 4.5 and 4.6 • Provided first response to contain virus outbreaks and other attacks. • Administration of client groups, create and manage AV policies according to the security requirement. • Custom report creation and alert configuration based on client requirements in ePO console • Perform disaster recovery process during critical situation of patch update/up-grading the ePO • Creating and managing policies in McAfee SiteAdvisor 3.5
  • 4. • Discover and manage unidentified devices on the network using McAfee Rogue System Detection Sensor. • Performed migration from SEP 11 to SEP 12. • Managing and configuring Firewall rules, IDS & IPS policies in SEP. Designation: Analyst Company: HCL Comnet Experience: July 2010-Aug 2012 Roles & Activities: • Configuring and monitor all enterprise antivirus operations, schedule virus detection sweeps. • Installation and up-gradation of McAfee ePO in the existing environment. ( ePO 4.0,4.5 and 4.6) • Design and manage custom remote site with detailed end-user instructions and schedule for manual and automated DAT file update procedures. • Identify risks, recommend corrective measures and ensure the adequacy of existing information security controls. • Commended for technical, analytical and problem-solving skills; and customer service orientation. • Provide technical support and day to day administration of Cisco ASA firewall.