SlideShare a Scribd company logo
CURRICULUM VITAE
Mohammad Tahir Shekh
Email:- mohd_tahir_shaikh@yahoo.in
Phone:- +91-9738813359
Objective
Obtaining perpetually challenging position in Information security group to achieve high standards in
professional competencies so as to benefit self and the organization.
Professional Experience
Organization : National Bank OfKuwait (Aug. 2015 to Present)
Department : Security Operations Center (SOC)
Position : SOC Analyst
Essential Duties and Responsibilities
o Monitoring and Managing the real time events for the security devices (Firewall, Routers,
Servers) using the Arcsight
o Responsible for Arcsight System Health Monitoring, and basic Arcsight Trouble Shooting.
o Responsible for Arcsight Content Development (Reports, Rules, Filters, Active Channels, Dash
Boards etc.)
o Incident Analysis and Management in the Security Operations Center
o Preparing Daily Reports and Security Advisory for Devices
o Preparing Monthly Incident report with complete analysis of customer devices
o Analysing the Events and providing details and solutions to the next level
o Installing and configuring Arc sight Agent on customer critical servers and monitoring the events.
o Troubleshooting ArcSight Related Activities within short span of time Period.
o Preparing Security Advisory for the new vulnerabilities released and informing to the customers
o Preparing Reports Monthly for the entire customer. Which includes the Top Virus infected
machines and Top Attacks and Top Vulnerable Ports etc
o Raising and Implementing Change Control, Preparing knowledge base for all the incidents,
changes and problems resolved.
o Monitor all critical ports of Firewalls for continues security threats and do first level analysis /
troubleshooting for known / less critical security incidents.
Organization : Paladion Networks Pvt.ltd. (Oct. 2013 to July 2015)
Department : Security Operations Center (SOC)
Position : Analyst SOC Services
Essential Duties and Responsibilities
o Providing security services to clients using the SIEM tool ArcSight.
o End device Log integration with ArcSight.
o Monitoring the networks of several of the largest global businesses for potential intrusions and
questionable traffic.
o Log monitoring and analysis for devices such as Firewalls, IDS, IPS,Windows Servers, Unix
Servers,Proxies, etc.
o Managing ArcSight Agents, Rules, Filters, Dashboards, Active Channels, Reports and Queries,
Active lists.
o Experience on Event log monitoring tools and Proficient in participating for investigating security
breaches activities over network.
o Configured reports in ArcSight ESM as per the Customer requirement for various device classes
such as Firewalls, Databases,UNIXand Windows Servers, etc.
o Installing and Configuring SmartConnector software on Agent Server.
o Troubleshoot and resolve basic issues encountered during daily operation.
o Preparing Daily, Weekly and Monthly Incident report along with security advisory with
complete analysis of various device assets of client.
o Performed security analysis and Vulnerability Assessments with Nessus.
o Creating Standard Operating Procedures (SOP) for the team.
o Participating in monthly Customer Review Meeting to discuss the various networking equipments
performance.
Other Technical Skills
o Understanding of TCP/IP,DNS and Networking Fundamentals Routing & Switching.
o Fundamentals of Footprinting techniques, Scanning, Firewalls, Proxy servers,Firewalls, IPS,
IDS, ASA .
o Vulnerability management, DLP Management & Malware Analysis.
o Knowledge of Malwares- Trojans, Backdoors, Virus, Worms, Rootkits, Botnets, Spywares.
o Knowledge in various attack types such as DOS, DDOS,SQL Injection, Cross Site
Scripting(XSS), Buffer Overflow.
o Routing-Static, RIP,OSPF, EIGRP,BGP, Switching- VTP TRUNKING,Working on multilayer
switches, NAT, ACL, Advance WAN technologies(Frame relay), MPLS, Virtual link,
Redistribution, HSRP, GLBP, VRRP, Ether Channel, Private VLAN ,Backup & Restore
o Monitoring Tools: Arcsight, FireEye, McAfee epo, BalaBit, CSMA, Nessus Vulnerability
Scanner.
Global Certification
Cisco Certified Network Associate (CCNA)(R&S)
Cisco ID: CSCO12425726
Cisco Certified Network Associate (CCNA)(Security)
Cisco ID: CSCO12509371
Microsoft Certified IT Professional (Id: D706-8263)
Microsoft Certified Technology Specialist(Id: D706-2419 )
Trainings Undertaken
o CCNP(R&S).
o Near Future Goal : CEH (Certified Ethical Hacker)
Academic Qualifications
o Bachelor ofTechnology (B.Tech) in Computer Science from JECRC UDML college of
Engineering, Jaipur in 2013.
Personal Details
Father’s Name : Mohammad Salim Shekh
Date of Birth : 22nd February 1990
Nationality : Indian
Language Proficiency : Hindi, English
Marital Status : Single
Passport : M9395890
*I hereby confirm that the above information is correct to the best of my knowledge.
Mohammad Tahir Shekh

More Related Content

What's hot

Resume - Varsharani
Resume - VarsharaniResume - Varsharani
Resume - Varsharani
Varsharani Kallimath
 
Prabhu Resume
Prabhu ResumePrabhu Resume
Prabhu Resume
Prabhu P
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
LogRhythm
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
Sophos Benelux
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Symantec
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?
Ryan G. Murphy
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Digital Bond
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
ShivamSharma909
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
DeServ - Tecnologia e Servços
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
Mahmoud Yassin
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
Dragos, Inc.
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usm
AlienVault
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
David Sweigert
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
Kaspersky
 
How to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systemsHow to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systems
DATA SECURITY SOLUTIONS
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
Dhishant Abrol
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
AlienVault
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton Chuvakin
Anton Chuvakin
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
Priyanka Aash
 

What's hot (20)

Resume - Varsharani
Resume - VarsharaniResume - Varsharani
Resume - Varsharani
 
Prabhu Resume
Prabhu ResumePrabhu Resume
Prabhu Resume
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014Anatomy of an Attack - Sophos Day Belux 2014
Anatomy of an Attack - Sophos Day Belux 2014
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
What is Next-Generation Antivirus?
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?
 
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
 
Soc analyst course content
Soc analyst course contentSoc analyst course content
Soc analyst course content
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usm
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
How to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systemsHow to discover vulnerabilities in business and mission critical systems
How to discover vulnerabilities in business and mission critical systems
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
Log Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton ChuvakinLog Standards & Future Trends by Dr. Anton Chuvakin
Log Standards & Future Trends by Dr. Anton Chuvakin
 
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
What We’ve Learned Building a Cyber  Security Operation Center: du Case  StudyWhat We’ve Learned Building a Cyber  Security Operation Center: du Case  Study
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
 

Viewers also liked

Presentacion demo mc afee siem
Presentacion demo mc afee siemPresentacion demo mc afee siem
Presentacion demo mc afee siem
victor bueno
 
IT Security Resume 2015
IT Security Resume 2015IT Security Resume 2015
IT Security Resume 2015
yellapu nagendra Rameshyellapu55
 
Hemant_Experience
Hemant_ExperienceHemant_Experience
Hemant_Experience
Hemant Bairagi
 
Swapnil Goud Tadkal
Swapnil Goud TadkalSwapnil Goud Tadkal
Swapnil Goud Tadkal
Swapnil Goud Tadkal
 
pandi.resume (1)
pandi.resume (1)pandi.resume (1)
pandi.resume (1)
pandiarajan Impandiarajan
 
VIPIN_GUPTA_SECURITY_ANALYST
VIPIN_GUPTA_SECURITY_ANALYSTVIPIN_GUPTA_SECURITY_ANALYST
VIPIN_GUPTA_SECURITY_ANALYST
VIPIN KUMAR GUPTA
 
Ashwin Resume
Ashwin ResumeAshwin Resume
Ashwin Resume
Ashwin Vijay
 
Ambrish keshari resume
Ambrish keshari  resumeAmbrish keshari  resume
Ambrish keshari resume
Ambrish Keshari
 
Clinton Resume
Clinton ResumeClinton Resume
Clinton Resume
John Paul Clinton
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
Manoj Kumar M
 
Mohini_experience
Mohini_experienceMohini_experience
Mohini_experience
Mohini Karpe
 
Devasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar Mahato - Resume
Devasis Kumar Mahato - Resume
Devasis Kumar
 
Rajesh Gurunathan - Network security & Arcsight
Rajesh Gurunathan - Network security & ArcsightRajesh Gurunathan - Network security & Arcsight
Rajesh Gurunathan - Network security & Arcsight
Rajesh Gurunathan
 
Resume recent-b
Resume recent-bResume recent-b
Resume recent-b
Krishna Mohan E S V
 

Viewers also liked (14)

Presentacion demo mc afee siem
Presentacion demo mc afee siemPresentacion demo mc afee siem
Presentacion demo mc afee siem
 
IT Security Resume 2015
IT Security Resume 2015IT Security Resume 2015
IT Security Resume 2015
 
Hemant_Experience
Hemant_ExperienceHemant_Experience
Hemant_Experience
 
Swapnil Goud Tadkal
Swapnil Goud TadkalSwapnil Goud Tadkal
Swapnil Goud Tadkal
 
pandi.resume (1)
pandi.resume (1)pandi.resume (1)
pandi.resume (1)
 
VIPIN_GUPTA_SECURITY_ANALYST
VIPIN_GUPTA_SECURITY_ANALYSTVIPIN_GUPTA_SECURITY_ANALYST
VIPIN_GUPTA_SECURITY_ANALYST
 
Ashwin Resume
Ashwin ResumeAshwin Resume
Ashwin Resume
 
Ambrish keshari resume
Ambrish keshari  resumeAmbrish keshari  resume
Ambrish keshari resume
 
Clinton Resume
Clinton ResumeClinton Resume
Clinton Resume
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
 
Mohini_experience
Mohini_experienceMohini_experience
Mohini_experience
 
Devasis Kumar Mahato - Resume
Devasis Kumar Mahato - ResumeDevasis Kumar Mahato - Resume
Devasis Kumar Mahato - Resume
 
Rajesh Gurunathan - Network security & Arcsight
Rajesh Gurunathan - Network security & ArcsightRajesh Gurunathan - Network security & Arcsight
Rajesh Gurunathan - Network security & Arcsight
 
Resume recent-b
Resume recent-bResume recent-b
Resume recent-b
 

Similar to Mohammad Tahir_CV

Imran Resume
Imran ResumeImran Resume
Imran Resume
Imran Ulla
 
TIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_SecurityTIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_Security
carl yu
 
Resume
ResumeResume
Shashikant Chavan_Resume
Shashikant Chavan_ResumeShashikant Chavan_Resume
Shashikant Chavan_Resume
Shashikant Chavan CCNA, C|EH, ITIL V3
 
628577
628577628577
628577
Hayat Azizi
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
Santos Kumaar.S
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 
RESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEMRESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEM
Rajesh kumar
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
John Kingsley
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)
Abhishek Sa
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
Hayat Azizi
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS
 
tarunidhar
tarunidhartarunidhar
Biswajeeban
BiswajeebanBiswajeeban
Biswajeeban
Biswa Padhy
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center Manager
Pramod Yadav
 
Jatinder Singh
Jatinder SinghJatinder Singh
Jatinder Singh
Jatinder Virk
 
Resume
ResumeResume
Nachaat Mohamed resume
Nachaat Mohamed resumeNachaat Mohamed resume
Nachaat Mohamed resume
Nachaat
 
Willard_Grayson_201505
Willard_Grayson_201505Willard_Grayson_201505
Willard_Grayson_201505
Will Grayson
 
Resume
ResumeResume

Similar to Mohammad Tahir_CV (20)

Imran Resume
Imran ResumeImran Resume
Imran Resume
 
TIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_SecurityTIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_Security
 
Resume
ResumeResume
Resume
 
Shashikant Chavan_Resume
Shashikant Chavan_ResumeShashikant Chavan_Resume
Shashikant Chavan_Resume
 
628577
628577628577
628577
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
RESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEMRESUME_Pothirajan M-SIEM
RESUME_Pothirajan M-SIEM
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)
 
Hayat resume 1
Hayat resume 1Hayat resume 1
Hayat resume 1
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
tarunidhar
tarunidhartarunidhar
tarunidhar
 
Biswajeeban
BiswajeebanBiswajeeban
Biswajeeban
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center Manager
 
Jatinder Singh
Jatinder SinghJatinder Singh
Jatinder Singh
 
Resume
ResumeResume
Resume
 
Nachaat Mohamed resume
Nachaat Mohamed resumeNachaat Mohamed resume
Nachaat Mohamed resume
 
Willard_Grayson_201505
Willard_Grayson_201505Willard_Grayson_201505
Willard_Grayson_201505
 
Resume
ResumeResume
Resume
 

Mohammad Tahir_CV

  • 1. CURRICULUM VITAE Mohammad Tahir Shekh Email:- mohd_tahir_shaikh@yahoo.in Phone:- +91-9738813359 Objective Obtaining perpetually challenging position in Information security group to achieve high standards in professional competencies so as to benefit self and the organization. Professional Experience Organization : National Bank OfKuwait (Aug. 2015 to Present) Department : Security Operations Center (SOC) Position : SOC Analyst Essential Duties and Responsibilities o Monitoring and Managing the real time events for the security devices (Firewall, Routers, Servers) using the Arcsight o Responsible for Arcsight System Health Monitoring, and basic Arcsight Trouble Shooting. o Responsible for Arcsight Content Development (Reports, Rules, Filters, Active Channels, Dash Boards etc.) o Incident Analysis and Management in the Security Operations Center o Preparing Daily Reports and Security Advisory for Devices o Preparing Monthly Incident report with complete analysis of customer devices o Analysing the Events and providing details and solutions to the next level o Installing and configuring Arc sight Agent on customer critical servers and monitoring the events. o Troubleshooting ArcSight Related Activities within short span of time Period. o Preparing Security Advisory for the new vulnerabilities released and informing to the customers o Preparing Reports Monthly for the entire customer. Which includes the Top Virus infected machines and Top Attacks and Top Vulnerable Ports etc o Raising and Implementing Change Control, Preparing knowledge base for all the incidents, changes and problems resolved. o Monitor all critical ports of Firewalls for continues security threats and do first level analysis / troubleshooting for known / less critical security incidents. Organization : Paladion Networks Pvt.ltd. (Oct. 2013 to July 2015) Department : Security Operations Center (SOC) Position : Analyst SOC Services Essential Duties and Responsibilities o Providing security services to clients using the SIEM tool ArcSight.
  • 2. o End device Log integration with ArcSight. o Monitoring the networks of several of the largest global businesses for potential intrusions and questionable traffic. o Log monitoring and analysis for devices such as Firewalls, IDS, IPS,Windows Servers, Unix Servers,Proxies, etc. o Managing ArcSight Agents, Rules, Filters, Dashboards, Active Channels, Reports and Queries, Active lists. o Experience on Event log monitoring tools and Proficient in participating for investigating security breaches activities over network. o Configured reports in ArcSight ESM as per the Customer requirement for various device classes such as Firewalls, Databases,UNIXand Windows Servers, etc. o Installing and Configuring SmartConnector software on Agent Server. o Troubleshoot and resolve basic issues encountered during daily operation. o Preparing Daily, Weekly and Monthly Incident report along with security advisory with complete analysis of various device assets of client. o Performed security analysis and Vulnerability Assessments with Nessus. o Creating Standard Operating Procedures (SOP) for the team. o Participating in monthly Customer Review Meeting to discuss the various networking equipments performance. Other Technical Skills o Understanding of TCP/IP,DNS and Networking Fundamentals Routing & Switching. o Fundamentals of Footprinting techniques, Scanning, Firewalls, Proxy servers,Firewalls, IPS, IDS, ASA . o Vulnerability management, DLP Management & Malware Analysis. o Knowledge of Malwares- Trojans, Backdoors, Virus, Worms, Rootkits, Botnets, Spywares. o Knowledge in various attack types such as DOS, DDOS,SQL Injection, Cross Site Scripting(XSS), Buffer Overflow. o Routing-Static, RIP,OSPF, EIGRP,BGP, Switching- VTP TRUNKING,Working on multilayer switches, NAT, ACL, Advance WAN technologies(Frame relay), MPLS, Virtual link, Redistribution, HSRP, GLBP, VRRP, Ether Channel, Private VLAN ,Backup & Restore o Monitoring Tools: Arcsight, FireEye, McAfee epo, BalaBit, CSMA, Nessus Vulnerability Scanner. Global Certification Cisco Certified Network Associate (CCNA)(R&S) Cisco ID: CSCO12425726 Cisco Certified Network Associate (CCNA)(Security) Cisco ID: CSCO12509371
  • 3. Microsoft Certified IT Professional (Id: D706-8263) Microsoft Certified Technology Specialist(Id: D706-2419 ) Trainings Undertaken o CCNP(R&S). o Near Future Goal : CEH (Certified Ethical Hacker) Academic Qualifications o Bachelor ofTechnology (B.Tech) in Computer Science from JECRC UDML college of Engineering, Jaipur in 2013. Personal Details Father’s Name : Mohammad Salim Shekh Date of Birth : 22nd February 1990 Nationality : Indian Language Proficiency : Hindi, English Marital Status : Single Passport : M9395890 *I hereby confirm that the above information is correct to the best of my knowledge. Mohammad Tahir Shekh