SlideShare a Scribd company logo
DEVASIS KUMAR MAHATO
DOB: 01- July - 1987
Present Address:- #472, K- Main, VysyaBankColony,ShantiniketanLayout, Arekere,Bangalore- 560076
Phone No:- +91-8792223686,8095615064
Email:- devasiskrmahato@gmail.com
Profile Summary:-
 A total of 4+ years of experience in Information Security & SIEM. Team Lead –SOC Services with experience of
strong technical knowledge in technology, process analysisand review.
 Perform real-time investigation, analysis of event using SIEM tools (ArcSight) of Network Security Components and
device such as IPS, Firewalls, Web Application Firewall, Operating Systems like Windows and UNIX, Databases and
other Devices.
 Investigation of threats and real time attacks.
 Possess Knowledge on Log Baselines and understanding of how and where logs will be generated and stored for
different Application and Devices.
Organisation: PALADION NETWORKS, Bangalore(November 12th
, 2012 –Till Date)
India’s oneof the top leadingcompany providingfull servicemanaged Information and network security on a global scale.
Paladion Networks expertise extends over Banking-Finance-Insurance,IT,IT and Consulting,Telecommunications,Research
& Development.
Designation: Team Lead-SOC Services / SIEM ArcSight Admin– Level 2
Job Profile:
• 4+ years of SIEMexperience on ArcSight andSecuritymonitoring usingArcSight.
• Understanding of ArcSight ESM Product component which collect, process, model, prioritize, correlate, monitor, and analysis
enterprise generatedevents.
• Good understanding of phases of ArcSight ESM event life cycle and describe the functional processing which occurs during
each phase. Navigate the ArcSight console to effectively correlate, investigate, analysis and remediate both exposed and
obscure vulnerabilitiesto give situational awareness and real time incident response.
• Check systemhealthof ArcSight ESM, Logger andConnectors, Checkbackups andlogarchival status
• Collecting, analysing and preserving the evidence related to incidents . Log analysis, SIEM log analysis utilizing Enterprise
Products. Writingreports onincidents anddeliver them to Businessand other stakeholders.
• Creation of rules, Active List, Dashboard, active channels based on the customer requirements. Creation of reports, queries
and filter for the events that are generated in ArcSight Console. Ensure applicationavailability andSLA adherence
• Developandconfigure SIEMreports (i.e. dashboards includingdaily, weeklyandmonthlyreports) .
• Troubleshoot ArcSight Components (Connectors, ESM, andlogger).
• Reviewsecurity-relatedevents, assessing risk andvalidity, as well as reporting
• Assist, co-ordinate with the Manager on performinga risk reviewof the dailysecurityrequests that come from the business
• Assist, co-ordinate with the Security Incident Handling Team (onsite projects team) in providing assistance during
investigation.
• Interact with the process owners to understandthe nature ofbusiness, the controlsandpossible risk.
• On-Call Support function (responding to incidents offregular working hours andweekends/holidays)
• Potential to bring any possible security threats or violation of Security Policy to the notice of the Information Security
Manager.
• Act as a Subject Matter Expert and mentor/coach to other, less experienced team members; utilizing knowledge and
experience to quicklyresolve issuesand addressrisks ofa veryvolatile nature.
Academic Qualifications
Graduation and
Post Graduation
Passed (BCA-MCA Integrated programme) in year 2011 from IGNOU with (BCA-62%and MCA-
60%)
Class XII Passed Class XII(Science) from Kendriya Vidhyalaya,Chakradharpur (CBSE) in 2005with 58.2%.
Class X Passed Class X (ICSE) in year 2003 from S.E.Rly E/M School,Chakradharpur (I.C.S.E) with 71.3%
Certification
CCNA (R/S) Certified. CSCO12177242
ArcSight Admin+Analyst (HP0-A116)
Work EXPERIENCE
Security Analyst – SOC Services(Paladion Networks –November 2012 – Till Date)
# Client Project Role Details
Client 1,
Client 2
One of the Top5 banks
of Belgium , Paladion
|MSSP
Bank, MSSP Security
Analyst
 Reviewsecurityrelatedevents, assessing risk and
validity, as well as reporting.
 Handling Hotline calls/mails, Policy violation, IPS, ASA
and other securityincidents.
 Creating an incident ticket, Analyzing, Managing and
tracking security incidents to closure by coordinating
with different teams.
 Investigatingattacks/alerts ondifferent devices.
 Correlationof events as per the attach methodology.
 Analyzing IPS, IDS alerts and suggesting corrections to
minimize false positives
 Building content in ArcSight, Fine tuning correlation
rules.
 Performing trendanalysisandsuggest improvement to
securityaspect.
 Prepare and publishmanagement reports
 Troubleshooting connectors, Implementation and
connector Integration.
 Managinghealthof ArcSight Infrastructure.
 Gap assessment ofcontent developedandfine tuning.
Client 3 ,
Client 4,
Client 5,
Client 6,
Client 7,
Client 8,
Client 9,
Client 10
(A Bank inRiyad, KSA),
(A bank inQatar),
(A Resort andCasinoOf
Las Vegas),
(An ISPof UAE),
(A Govt Bank of Qatar),
(An Enterprise of
Malaysia),
(A leading Private Bank
of India),
(A retail groupof Dubai
havingstores in India)
Security
Operations
Team Lead
and
ArcSight
Admin
 Creating an incident ticket, Analyzing, Managing and tracking
security incidents to closure by coordinating with different
teams.
 Analyzing IPS, IDS alerts and suggesting corrections to
minimize false positives.
 Analyzing the correlatedevents over the network.
 Performing trend analysis and suggest improvement to
securityaspect.
 Writing reports on incidents and deliver them to Business and
other stakeholder.
 Understanding of ArcSight ESM product component which
collect, process, model, prioritize, correlate, monitor, and
analysis enterprise generate events.
 Buildingcontent inArcSight, Fine tuningcorrelation rules
 Prepare and publishmanagement reports
 Managingmultiple teams at the same time.
Client 11 A leadingBank of KSA
(Onsite)
Security
Operations
ArcSight
Admin
 Understanding of ArcSight ESM product component which
collect, process, model, prioritize, correlate, monitor, and
analysis enterprise generate events.
 Buildingcontent inArcSight, Fine tuningcorrelation rules
 Prepare and publishmanagement reports.
ITIL
Awards and Recognitions
Received Paladion Champ Award twice in 2015 and 2016.
I hereby declare that all the above information is true and if necessary additional proof will be
provided.
Date:
Place: Bangalore Devasis Kumar Mahato

More Related Content

What's hot

Privileged Access Manager POC Guidelines
Privileged Access Manager  POC GuidelinesPrivileged Access Manager  POC Guidelines
Privileged Access Manager POC Guidelines
Hitachi ID Systems, Inc.
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges
BeyondTrust
 
Cyber ark training
Cyber ark trainingCyber ark training
Cyber ark training
Global Online Trainings
 
Windows System Administrator skills Claudia Salajan
Windows System Administrator skills Claudia SalajanWindows System Administrator skills Claudia Salajan
Windows System Administrator skills Claudia Salajanclaudia salajan
 
Aneesh_System Administrator Linux & Windows
Aneesh_System Administrator Linux & Windows Aneesh_System Administrator Linux & Windows
Aneesh_System Administrator Linux & Windows Aneesh R
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
Nis
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
AVEVA
 
Wasib Resume(Information Security)
Wasib Resume(Information Security)Wasib Resume(Information Security)
Wasib Resume(Information Security)Wasib Ahmed
 
Secure Management of Privileged Passwords
Secure Management of Privileged PasswordsSecure Management of Privileged Passwords
Secure Management of Privileged Passwords
Hitachi ID Systems, Inc.
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
Aidy Tificate
 
How to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile EnvironmentsHow to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile Environments
danb02
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
Ronny Stavem
 
CyberArk Master Policy Intro
CyberArk Master Policy IntroCyberArk Master Policy Intro
CyberArk Master Policy Intro
CyberArk
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
Hitachi ID Systems, Inc.
 
Adam R. Moore Security Architect Resume
Adam R. Moore Security Architect ResumeAdam R. Moore Security Architect Resume
Adam R. Moore Security Architect Resume
Adam Moore
 
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
Micro Focus
 

What's hot (20)

Privileged Access Manager POC Guidelines
Privileged Access Manager  POC GuidelinesPrivileged Access Manager  POC Guidelines
Privileged Access Manager POC Guidelines
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges
 
Cyber ark training
Cyber ark trainingCyber ark training
Cyber ark training
 
Windows System Administrator skills Claudia Salajan
Windows System Administrator skills Claudia SalajanWindows System Administrator skills Claudia Salajan
Windows System Administrator skills Claudia Salajan
 
Aneesh_System Administrator Linux & Windows
Aneesh_System Administrator Linux & Windows Aneesh_System Administrator Linux & Windows
Aneesh_System Administrator Linux & Windows
 
Privileged identity management
Privileged identity managementPrivileged identity management
Privileged identity management
 
SCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web StudioSCADA and HMI Security in InduSoft Web Studio
SCADA and HMI Security in InduSoft Web Studio
 
Shashikant Chavan_Resume
Shashikant Chavan_ResumeShashikant Chavan_Resume
Shashikant Chavan_Resume
 
Yazeed Resume (UPDATED) 2.1
Yazeed Resume (UPDATED) 2.1Yazeed Resume (UPDATED) 2.1
Yazeed Resume (UPDATED) 2.1
 
Wasib Resume(Information Security)
Wasib Resume(Information Security)Wasib Resume(Information Security)
Wasib Resume(Information Security)
 
Secure Management of Privileged Passwords
Secure Management of Privileged PasswordsSecure Management of Privileged Passwords
Secure Management of Privileged Passwords
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
How to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile EnvironmentsHow to Build Security and Risk Management into Agile Environments
How to Build Security and Risk Management into Agile Environments
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
 
CyberArk Master Policy Intro
CyberArk Master Policy IntroCyberArk Master Policy Intro
CyberArk Master Policy Intro
 
Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
Adam R. Moore Security Architect Resume
Adam R. Moore Security Architect ResumeAdam R. Moore Security Architect Resume
Adam R. Moore Security Architect Resume
 
Wayne_Resume
Wayne_ResumeWayne_Resume
Wayne_Resume
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
 
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
 

Viewers also liked

Presentacion demo mc afee siem
Presentacion demo mc afee siemPresentacion demo mc afee siem
Presentacion demo mc afee siem
victor bueno
 
VIPIN_GUPTA_SECURITY_ANALYST
VIPIN_GUPTA_SECURITY_ANALYSTVIPIN_GUPTA_SECURITY_ANALYST
VIPIN_GUPTA_SECURITY_ANALYSTVIPIN KUMAR GUPTA
 
Ambrish keshari resume
Ambrish keshari  resumeAmbrish keshari  resume
Ambrish keshari resume
Ambrish Keshari
 

Viewers also liked (9)

Resume
ResumeResume
Resume
 
Presentacion demo mc afee siem
Presentacion demo mc afee siemPresentacion demo mc afee siem
Presentacion demo mc afee siem
 
Swapnil Goud Tadkal
Swapnil Goud TadkalSwapnil Goud Tadkal
Swapnil Goud Tadkal
 
pandi.resume (1)
pandi.resume (1)pandi.resume (1)
pandi.resume (1)
 
IT Security Resume 2015
IT Security Resume 2015IT Security Resume 2015
IT Security Resume 2015
 
Hemant_Experience
Hemant_ExperienceHemant_Experience
Hemant_Experience
 
Mohammad Tahir_CV
Mohammad Tahir_CVMohammad Tahir_CV
Mohammad Tahir_CV
 
VIPIN_GUPTA_SECURITY_ANALYST
VIPIN_GUPTA_SECURITY_ANALYSTVIPIN_GUPTA_SECURITY_ANALYST
VIPIN_GUPTA_SECURITY_ANALYST
 
Ambrish keshari resume
Ambrish keshari  resumeAmbrish keshari  resume
Ambrish keshari resume
 

Similar to Devasis Kumar Mahato - Resume

Prabhu Resume
Prabhu ResumePrabhu Resume
Prabhu ResumePrabhu P
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin Carrow
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016Adel Zayed
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
gemmarie1
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)Abhishek Sa
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
Netpluz Asia Pte Ltd
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoringTony Kenny
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown267905
 
Nachaat Mohamed resume
Nachaat Mohamed resumeNachaat Mohamed resume
Nachaat Mohamed resumeNachaat
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
Fahmi Albaheth
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked inJohn Masiliunas
 

Similar to Devasis Kumar Mahato - Resume (20)

Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
tarunidhar
tarunidhartarunidhar
tarunidhar
 
Imran Resume
Imran ResumeImran Resume
Imran Resume
 
Prabhu Resume
Prabhu ResumePrabhu Resume
Prabhu Resume
 
Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015Erwin (Chris) Carrow resume Brief 10-23-2015
Erwin (Chris) Carrow resume Brief 10-23-2015
 
Dinesh_Resume
Dinesh_ResumeDinesh_Resume
Dinesh_Resume
 
My CV-Jan-2016
My CV-Jan-2016My CV-Jan-2016
My CV-Jan-2016
 
Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...Providing a Flexible Approach to the Inflexible World of Information Security...
Providing a Flexible Approach to the Inflexible World of Information Security...
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
Resume -Resume -continous monitoring
Resume -Resume -continous monitoringResume -Resume -continous monitoring
Resume -Resume -continous monitoring
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Nachaat Mohamed resume
Nachaat Mohamed resumeNachaat Mohamed resume
Nachaat Mohamed resume
 
Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
SSBRadley Resume_June2015
SSBRadley Resume_June2015SSBRadley Resume_June2015
SSBRadley Resume_June2015
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked in
 

Devasis Kumar Mahato - Resume

  • 1. DEVASIS KUMAR MAHATO DOB: 01- July - 1987 Present Address:- #472, K- Main, VysyaBankColony,ShantiniketanLayout, Arekere,Bangalore- 560076 Phone No:- +91-8792223686,8095615064 Email:- devasiskrmahato@gmail.com Profile Summary:-  A total of 4+ years of experience in Information Security & SIEM. Team Lead –SOC Services with experience of strong technical knowledge in technology, process analysisand review.  Perform real-time investigation, analysis of event using SIEM tools (ArcSight) of Network Security Components and device such as IPS, Firewalls, Web Application Firewall, Operating Systems like Windows and UNIX, Databases and other Devices.  Investigation of threats and real time attacks.  Possess Knowledge on Log Baselines and understanding of how and where logs will be generated and stored for different Application and Devices. Organisation: PALADION NETWORKS, Bangalore(November 12th , 2012 –Till Date) India’s oneof the top leadingcompany providingfull servicemanaged Information and network security on a global scale. Paladion Networks expertise extends over Banking-Finance-Insurance,IT,IT and Consulting,Telecommunications,Research & Development. Designation: Team Lead-SOC Services / SIEM ArcSight Admin– Level 2 Job Profile: • 4+ years of SIEMexperience on ArcSight andSecuritymonitoring usingArcSight. • Understanding of ArcSight ESM Product component which collect, process, model, prioritize, correlate, monitor, and analysis enterprise generatedevents. • Good understanding of phases of ArcSight ESM event life cycle and describe the functional processing which occurs during each phase. Navigate the ArcSight console to effectively correlate, investigate, analysis and remediate both exposed and obscure vulnerabilitiesto give situational awareness and real time incident response. • Check systemhealthof ArcSight ESM, Logger andConnectors, Checkbackups andlogarchival status • Collecting, analysing and preserving the evidence related to incidents . Log analysis, SIEM log analysis utilizing Enterprise Products. Writingreports onincidents anddeliver them to Businessand other stakeholders. • Creation of rules, Active List, Dashboard, active channels based on the customer requirements. Creation of reports, queries and filter for the events that are generated in ArcSight Console. Ensure applicationavailability andSLA adherence • Developandconfigure SIEMreports (i.e. dashboards includingdaily, weeklyandmonthlyreports) . • Troubleshoot ArcSight Components (Connectors, ESM, andlogger). • Reviewsecurity-relatedevents, assessing risk andvalidity, as well as reporting • Assist, co-ordinate with the Manager on performinga risk reviewof the dailysecurityrequests that come from the business • Assist, co-ordinate with the Security Incident Handling Team (onsite projects team) in providing assistance during investigation. • Interact with the process owners to understandthe nature ofbusiness, the controlsandpossible risk. • On-Call Support function (responding to incidents offregular working hours andweekends/holidays) • Potential to bring any possible security threats or violation of Security Policy to the notice of the Information Security Manager. • Act as a Subject Matter Expert and mentor/coach to other, less experienced team members; utilizing knowledge and experience to quicklyresolve issuesand addressrisks ofa veryvolatile nature.
  • 2. Academic Qualifications Graduation and Post Graduation Passed (BCA-MCA Integrated programme) in year 2011 from IGNOU with (BCA-62%and MCA- 60%) Class XII Passed Class XII(Science) from Kendriya Vidhyalaya,Chakradharpur (CBSE) in 2005with 58.2%. Class X Passed Class X (ICSE) in year 2003 from S.E.Rly E/M School,Chakradharpur (I.C.S.E) with 71.3% Certification CCNA (R/S) Certified. CSCO12177242 ArcSight Admin+Analyst (HP0-A116) Work EXPERIENCE Security Analyst – SOC Services(Paladion Networks –November 2012 – Till Date) # Client Project Role Details Client 1, Client 2 One of the Top5 banks of Belgium , Paladion |MSSP Bank, MSSP Security Analyst  Reviewsecurityrelatedevents, assessing risk and validity, as well as reporting.  Handling Hotline calls/mails, Policy violation, IPS, ASA and other securityincidents.  Creating an incident ticket, Analyzing, Managing and tracking security incidents to closure by coordinating with different teams.  Investigatingattacks/alerts ondifferent devices.  Correlationof events as per the attach methodology.  Analyzing IPS, IDS alerts and suggesting corrections to minimize false positives  Building content in ArcSight, Fine tuning correlation rules.  Performing trendanalysisandsuggest improvement to securityaspect.  Prepare and publishmanagement reports  Troubleshooting connectors, Implementation and connector Integration.  Managinghealthof ArcSight Infrastructure.  Gap assessment ofcontent developedandfine tuning. Client 3 , Client 4, Client 5, Client 6, Client 7, Client 8, Client 9, Client 10 (A Bank inRiyad, KSA), (A bank inQatar), (A Resort andCasinoOf Las Vegas), (An ISPof UAE), (A Govt Bank of Qatar), (An Enterprise of Malaysia), (A leading Private Bank of India), (A retail groupof Dubai havingstores in India) Security Operations Team Lead and ArcSight Admin  Creating an incident ticket, Analyzing, Managing and tracking security incidents to closure by coordinating with different teams.  Analyzing IPS, IDS alerts and suggesting corrections to minimize false positives.  Analyzing the correlatedevents over the network.  Performing trend analysis and suggest improvement to securityaspect.  Writing reports on incidents and deliver them to Business and other stakeholder.  Understanding of ArcSight ESM product component which collect, process, model, prioritize, correlate, monitor, and analysis enterprise generate events.  Buildingcontent inArcSight, Fine tuningcorrelation rules  Prepare and publishmanagement reports  Managingmultiple teams at the same time. Client 11 A leadingBank of KSA (Onsite) Security Operations ArcSight Admin  Understanding of ArcSight ESM product component which collect, process, model, prioritize, correlate, monitor, and analysis enterprise generate events.  Buildingcontent inArcSight, Fine tuningcorrelation rules  Prepare and publishmanagement reports.
  • 3. ITIL Awards and Recognitions Received Paladion Champ Award twice in 2015 and 2016. I hereby declare that all the above information is true and if necessary additional proof will be provided. Date: Place: Bangalore Devasis Kumar Mahato