looking for security analyst jobs
Candidate Information
Contact Details
About candidate
• Network Creation and implementing scanner appliances.
• Asset group creations and providing user permissions.
• Proficient in SIEM Splunk, Endpoint Security, Nessus.
• Proficientin Security Analysis and Incident Response
• Proactively advising customers about the most recent vulnerabilities/attacks and
advising them with possible mitigation controls.
• Detecting Suspicious Logs, creating reports C Charts for easy understandable by
Client, communicating with Clients regarding issues.
• Real Time Log analysis from different network devices such as Firewalls, IDS, IPS,
Operating Systems like Windows, UNIX, Proxy Servers, Windows Servers,
Application and Networking Devices.
• Understanding of network architecture including OS and vulnerability assessment.
• Good communication and presentation skills.
• Conducted Web Application Security Penetration testing(DAST) using automated
process.
• Good experience of working along with international customers, conducting
meeting and presentations.
• Served as Analyst in SOC operations for real-time monitoring.
• Analyzing logs from various security and infrastructure appliances.
• Administrating various incidents/security alerts triggered in SIEM tool.
Tool.
• Deployed Qualys Scanner appliances in Virtual environment and scheduled the required
scans to perform the vulnerability scanning.
• For windows Assets like servers and workstations deployed the Qualys cloud agents and
segregated based on different geographical locations.
• Handled Business units and created Asset groups and tags in Qualys.
• Options profile management and verifying the scan is successfully completed or not by
checking the live and dead hosts in the Vulnerability report.
• Regular health check of Scanner Appliances, total agents reporting and how many
authentication records are successful.
• Performing vulnerability analysis of the resultsfetched from the vulnerability scan report.
• Understanding of risk assessment methodologiessuch as CVSS.
• Network Creation and implementing scanner appliances.
• Asset group creations and providing user permissions.
• Scheduling and running vulnerability scans and reportsfor weekly and monthly basis.
• Analysing vulnerability reports and providing inputs to the respective teams.
• Working with Kenna Security tool to track all the vulnerabilities in the Organization based
on the risk score and severity.
• Running NMAP and NETCAT port scansfor validation when necessary.
• Running External network port scans to identify any exposed open ports of our public
facing domains and IP Address.
• Working and coordinating proactively with the respective teams in resolving the
vulnerabilities
Tool.
• Deployed Qualys Scanner appliances in Virtual environment and scheduled the required
scans to perform the vulnerability scanning.
• For windows Assets like servers and workstations deployed the Qualys cloud agents and
segregated based on different geographical locations.
• Handled Business units and created Asset groups and tags in Qualys.
• Options profile management and verifying the scan is successfully completed or not by
checking the live and dead hosts in the Vulnerability report.
• Regular health check of Scanner Appliances, total agents reporting and how many
authentication records are successful.
• Performing vulnerability analysis of the resultsfetched from the vulnerability scan report.
• Understanding of risk assessment methodologiessuch as CVSS.
• Network Creation and implementing scanner appliances.
• Asset group creations and providing user permissions.
• Scheduling and running vulnerability scans and reportsfor weekly and monthly basis.
• Analysing vulnerability reports and providing inputs to the respective teams.
• Working with Kenna Security tool to track all the vulnerabilities in the Organization based
on the risk score and severity.
• Running NMAP and NETCAT port scansfor validation when necessary.
• Running External network port scans to identify any exposed open ports of our public
facing domains and IP Address.
• Working and coordinating proactively with the respective teams in resolving the
vulnerabilities
Tool.
• Deployed Qualys Scanner appliances in Virtual environment and scheduled the required
scans to perform the vulnerability scanning.
• For windows Assets like servers and workstations deployed the Qualys cloud agents and
segregated based on different geographical locations.
• Handled Business units and created Asset groups and tags in Qualys.
• Options profile management and verifying the scan is successfully completed or not by
checking the live and dead hosts in the Vulnerability report.
• Regular health check of Scanner Appliances, total agents reporting and how many
authentication records are successful.
• Performing vulnerability analysis of the resultsfetched from the vulnerability scan report.
• Understanding of risk assessment methodologiessuch as CVSS.
• Network Creation and implementing scanner appliances.
• Asset group creations and providing user permissions.
• Scheduling and running vulnerability scans and reportsfor weekly and monthly basis.
• Analysing vulnerability reports and providing inputs to the respective teams.
• Working with Kenna Security tool to track all the vulnerabilities in the Organization based
on the risk score and severity.
• Running NMAP and NETCAT port scansfor validation when necessary.
• Running External network port scans to identify any exposed open ports of our public
facing domains and IP Address.
• Working and coordinating proactively with the respective teams in resolving the
vulnerabilities
Cover latter
Handled end to end Administration and engineering of Qualys Vulnerability Management
Tool.
• Deployed Qualys Scanner appliances in Virtual environment and scheduled the required
scans to perform the vulnerability scanning.
• For windows Assets like servers and workstations deployed the Qualys cloud agents and
segregated based on different geographical locations.
• Handled Business units and created Asset groups and tags in Qualys.
• Options profile management and verifying the scan is successfully completed or not by
checking the live and dead hosts in the Vulnerability report.
• Regular health check of Scanner Appliances, total agents reporting and how many
authentication records are successful.
• Performing vulnerability analysis of the resultsfetched from the vulnerability scan report.
• Understanding of risk assessment methodologiessuch as CVSS.
• Network Creation and implementing scanner appliances.
• Asset group creations and providing user permissions.
• Scheduling and running vulnerability scans and reportsfor weekly and monthly basis.
• Analysing vulnerability reports and providing inputs to the respective teams.
• Working with Kenna Security tool to track all the vulnerabilities in the Organization based
on the risk score and severity.
• Running NMAP and NETCAT port scansfor validation when necessary.
• Running External network port scans to identify any exposed open ports of our public
facing domains and IP Address.
• Working and coordinating proactively with the respective teams in resolving the
vulnerabilities