► Detail-oriented & persistent SANS Certified Cyber Security Analyst with 6+ years of experience in the security & investigation industry► I am proficient in performing remediation to prevent exploitation of vulnerabilities and addressing cybersecurity challenges► Adept at implementing strategies to manage vulnerability scanning across the organization ► Deploying latest trend-based methodologies for combating next-generation cyber threats and delivering compelling value to key stakeholders & senior leadershipCareer Highlights & Achievements‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾★ Won the 'Best Performance of the Year Award' '19 for leading the SOC team successfully★ Presented 'Threat Intelligence and its' Uses' & a demonstration in Bangalore Null Meet Open Security community | '15 ★ Presented Research Day paper on 'Cyber Espionage using FLAME Malware' | SRM University '14★ Received First Prize in Departmental seminar out of 12 people based on Software EvaluationAreas of Expertise:‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾► SOC Plan Formulation & Management► Incident Identification & Remediation► Malware Analysis ► Information Security Management► Data Analysis► Security Event Monitoring ► SOC Operations► SIEM Solution Implementation► Cyber Threat Intelligence► Team Leadership► Client Relationship Management► SOARTechnical Competencies:‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾► SIEM Tools: IBM QRadar, Symantec LCP – Log Collection Platform, ELK ► Security OS: Linux, Kali Linux, Security Onion► Hacking Tools: Metasploit Framework, Nmap, Nessus, Acunetix Scanner ► Threat Intelligence: CRITs - Collaborative Research Into Threats, MISP, IBM X-Force, virusTotalKey Certifications‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾‾★ Certified Threat Intelligence Analyst | EC-Council | Sep '19 ★ SANS Certified Intrusion Analysts (GCIA) - SANS GIAC★ IBM QRadar Associate Analyst Version 7.2.6, IBM QRadar SIEM V7.2.8 Associate Administration, IBM QRadar Vulnerability Manager V7.2.6 Deployment | IBM Security Certified Ethical Hacker (CEH) ver.8 ★ EC Council Brisk Information Security Expert | Brisk CIA
Self-Employed
-
Cyber Security TrainerSelf-Employed Feb 2021 - PresentPuducherry, India
-
Soc LeadCybergate Defense Jan 2019 - Dec 2020Abu Dhabi, United Arab EmiratesKey Achievements★ Bagged 'Best Performance of the Year Award' '19 for leading the SOC team successfully ★ Created & fine-tuned 80+ different types of rules in SIEM SolutionSOC Operations ► Spearheading 15 indent & SIEM Analyst/Engineers in SOC► Directing SOC operations & onboarding new customers while managing shifts/teams in 24x7 SOC environment► Guiding L1/L2 SOC Analysts on investigation & mitigation of security threats & incidentsSIEM Solution Deployment ► Conducting monthly meetings with customers to highlight work done by SOC to establish robust customer relationships► Utilizing SIEM Solution for government entities across UAE including SIEM High Availability setup ► Troubleshooting log sources while creating customer parsers for devices such as Symantec Mail Gateway, FortiMail, etc.► Deploying IBM QRadar to integrate firewalls, antivirus solutions, domain controllers, Linux servers, proxy, etc. IOC Collection & Threat Detection► Collecting different IOCs by deploying Threat Intel platform & automating in SIEM for advance threat identification► Developing Threat Intel Advisory for the latest malware, vulnerabilities, APTs, etc.Data Evaluation ► Engaging in hunt missions by exploiting threat intelligence & evaluating anomalous log data to eliminate threat actors► Designing threat hunting dashboards to identify potential threats, suspicious activities & malware► Delivering Threat Intelligence Advisory reports (15+ so far) to customers based on vulnerabilities, malware, etc.Project Planning & Client Relationship Management► Orchestrating SOC project plans for multiple governments in UAE► Acting as a primary Operational Contact for clients & first point of escalation for SOC teams ► Devising 50+ use case SOPs & SOC procedures Plan Formulation► Improving incident identification & response by implementing additional detective capabilities ► Formulating security incident response plan along with incident response process & playbooks -
Mss Cyber Security EngineerSymantec Nov 2017 - Jan 2019Chennai, IndiaCyber Security Operations Management & Threat Identification► Administrated Cyber Security intelligence team operations spanning security incident monitoring via; ● Symantec Log Collection Platform, analysis, reporting, mitigation, intelligence generation from the available logs/correlations► Inspected logs to identify & categorize threat severity level whilst reporting it to the customers as part of GSOC team► Managed new threats identification and enabled detection methodology for the same Security Improvements & Customer Servicing► Recommend improvements by identifying needs & opportunities in the security posture of the client based on attack pattern/threats observed in the customer network ► Determined client's requests via phone, email & client portal and oversaw high priority security incidents on a daily basisLCP Installation & Threat Remediation► Installed Symantec LCP for 500+ customers for collecting logs from various security devices ► Reviewed customer queries and educated them with threat remediation strategies & the best security practices► Troubleshot different types of log sources and escalated the same to the customers Security Devices Integration & Module Development► Integrated multiple security devices such as Check Point, Palo Alto, Sourcefire, SEPM, Cisco ASA, Windows, and Linux, with LCP► Developed modules on the basics of security attacks to the SIEM platform to give security training for entire security ► Provided Tier-1 level response for technical support via Firewalls technologies & IDP/IDS technologies for global customers -
Associate Consultant & Sr Information Security AnalystWipro Feb 2015 - Oct 2017Bengaluru Area, IndiaSIEM & Security Audits► Performed real-time log analysis and generated security incident from SIEM tool ► Spearheaded L1 analyst & SIEM administration teams while implementing the SIEM tool for customers Gap Analysis ► Presented SOC tour to customers and generated gap analysis report for banking customers ► Conducted QRadar GAP analysis audit for 2+ banking customersSOC Operations & Incident Analysis► Governed SOC operations like performing log analysis, designing new correlation rules, configuring dashboards & creating reports based on customer requirements ► Conducted historical analysis of incidents by utilizing IBM QRadar SIEM tool, fine-tuned existing correlation rules to curtail false-positives► Responded to 40+ incidents in SIEM on a daily basisIBM QRadar Implementation & LSX Development► Implemented IBM QRadar and QVM for 8+ customers ► Performed QRadar installation on AWS & integrated different log sources for one of the biggest telecom companies in US► Developed LSX & Regex for log sources like FortiDB, FortiWAF, Radware Load Balancer, etc.Health Check Framework & Use Cases Development► Operated QRadar health check framework & troubleshot log sources to keep SIEM tool running 24/7► Inspected the health check report to know if all the devices reporting to SIEM are sending logs without any interruption ► Developed 20+ use cases based on customer requirements and tested & implemented on the customer production serversLog Source Integration & Customer Environment► Consolidated log sources like Check Point, McAfee ePO, UNIX, Windows Server, MS SQL, etc. with IBM QRadar► Oversaw integration of log sources during customers onboarding & modifications of existing customer environmentDocumentation & Training► Merged many third party extension threat feed search engines such as IPVoid & Virus-Total► Developed SOP and POC documents for client projects► Imparted security training to all freshers w.r.t network, Ethical Hacking, SIEM, etc. -
Information Security Analyst - L1Wipro Limited Feb 2015 - Aug 2015Bengaluru Area, IndiaSecurity Monitoring & Threat Intelligence Configuration► Performed security monitoring and identified security incidents by evaluating network traffic & logs data by deploying IBM QRadar► Analyzed the security incidents based on Deep Drive Kill Chain Process as part of the Cyber Kill Chain framework ► Configured various Open Source Threat Intelligence independently as an add-on security service to collect threat intelligence data from open Source threat database and feeding it into SIEM -
Design EngineerMani Engineering And Enterprise Jan 2012 - Jan 2013
Frequently Asked Questions about Prabhakaran S
What company does Prabhakaran S work for?
Prabhakaran S works for Self-Employed
What is Prabhakaran S's role at the current company?
Prabhakaran S's current role is Former Security Operation Center Specialist | SOC Lead.
Not the Prabhakaran S you were looking for?
-
-
-
PRABHAKARAN S
Electrical And Electronics Engineering | Actively Seeking Full Time Opportunities In Electrical EngineeringThoothukudi -
-
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial