Information Security Engineer

/
/
Information Security Engineer
ID : 1784
Education level  : Bachelor's degree
Work experience level  : Intermediate- (2-4 year experience)
Work experience in total  : Years
Job type  : Online
Job time  : Maandelijks
Last date of registration :
2022-12-29
Profile description

Accomplished Information Security Engineer with 4 years of experience leading the development and daily management of information security systems for reputed organizations. Leading 24/5 SOC operations across the globe safeguarding both on-prem and cloud infrastructure against evolving threats and safeguarding organization security posture with advance countermeasures. Expertise in threat detection, mitigation, and management. Eager to contribute in a senior-level IT security role.

Work experience In details :
Job position
Job description

Information Security Engineer - IFS - (July 2021- Present)

  • Leading operations of 24/5 Security Operation Center (SOC).
  • Security incident response, triage, containment, investigation, and root cause analysis.
  • Threat hunting, threat intelligence and analysis.
  • Created and updated procedures, self-help articles, including the run books and articles.
  • Risk assessment and mitigation.
  • Red teaming and purple teaming security scenario handling.
  • Conduct user awareness, consultation, and training.
  • Alerts monitoring via Microsoft tooling CloudApp Security, Security and Compliance center, ATP, ATA, Sentinel and Azure Security center.
  • Incident documentation (Report creation).
  • Plan/contribute SOC strategic direction and stakeholder management.

Associate Information Security Analyst - Pearson Lanka - (July 2019 - July 2021)

  • Leading operations of24/7 Security Operation Center (SOC).
  • Analyzed real-time and archived alert, intrusion, vulnerability, and audit data.
  • Monitored the security management consoles, analyzed real-time and archived alert, intrusion, vulnerability, and audit data.
  • Investigated and document security incidents, ruling out false positives.
  • Produced security summary and activity reports as required.
  • Ensured security tools are running correctly.
  • Forensics analysis/investigation of compromised devices.
  • Acted as initial security representative on incident management Bridges.
  • Appropriately priorities and escalate incidents to next level (as outlined in global incident management policy) when required.
  • Produced security summary and activity reports as required.
  • Identified major or common attacks and reconnaissance techniques that are identifiable in the payload of suspicious network traffic.
  • Identified requirements for additional data collection to execute investigations into security incidents.

Information Security Analyst - Cryptogen - (October 2018 – June 2019)

  • Vulnerability Assessment, Reporting and Management.
  • Intrusion Prevention System (IPS) Monitoring and Analysis. (McAfee Network Security Monitor)
  • Web Application firewall Monitoring.
  • SIEM Monitoring.
  • Threat Intelligence data evaluation using Indicators of Compromise. (IOC)
  • Policy, Standard and Process Development and Documentation.
  • Correlate and discover relationships between seemingly unrelated events and incidents.
Hard skills
  • Incident Analysis and Response
  • Cross platform Log analysis
  • Security vulnerability assessment (Qualys, Nessus, Kenna)
  • Malware Analysis
  • Digital forensics (Encase, Autopsy)
  • SIEM (Splunk, LogRhythm)
  • Threat Hunting
  • DDos protection service (Akamai)
  • Cloud monitoring (Azure, AWS)
  • Email filtering (Proofpoint, Fireeye)
  • Web Email filtering (Proofpoint, Fireeye)
  • Microsoft Security Suite (Advance Threat Analytics, Identity Protection, Sentinel, Endpoint detection and response, Intune, Security & Compliance)
Soft skills
  • Critical Thinking
  • Team Collaboration
  • Adopt and response
  • Commercial Awareness
  • Written and verbal communication skills
  • Self-motivation and ability to take the initiative
Achievements
  • PROFESSIONAL QUALIFICATIONS:
    • CHFI – Computer Hacking Forensic Investigator
    • AZ-900 – Microsoft Certified: Azure Fundamentals
    • CNSS – Certified Network Security Specialist
    • Splunk – Splunk 7.x Fundamentals
    • Qualys – Qualys certified specialist
    • Foundations of Operationalizing MITRE ATT&CK
Special notes

Incident Analysis and Response, Cross platform Log analysis, Security vulnerability assessment (Qualys, Nessus, Kenna), Malware Analysis, Digital forensics (Encase, Autopsy), SIEM (Splunk, LogRhythm),
Threat Hunting, DDos protection service (Akamai), Cloud monitoring (Azure, AWS), Email filtering, Web Email filtering, Microsoft Security Suite

 

Meer person

ID : 2042
Associate Software Engineer
Education level: Bachelor's degree
Work experience level: Intermediate- (2-4 year experience)
ID : 2041
System Engineer IT
Education level: Bachelor's degree
Work experience level: Experienced- (4-7 year experience)
ID : 2040
Associate Engineer
Education level: Bachelor's degree
Work experience level: Associate- (1-2 year experience)
ID : 2039
Intern
Education level: Bachelor's degree
Work experience level: Beginner- (internship- 1 year experience)
Mis geen enkele belangrijke kennisgeving houd jezelf update
Begin met chatten!
Wij staan u graag te woord!
Hallo 👋
Kunnen we je helpen?