Portfolio

My Journey

  • Developed and implemented advanced correlation rules and use cases in the Next-Gen SIEM, leveraging diverse threat intelligence feeds and data sources for real-time detection and response to complex cyber threats.
  • Collaborated cross-functionally to identify data requirements, built automated categorizations reducing manual effort by 20%, and enhanced global intelligence of 50+ enterprise products.
  • Resolved high-priority technical issues, optimizing data ingestion pipelines, and reducing ingestion time by 8-24 hours, ensuring data integrity and preventing loss.
  • Conducted extensive research on emerging threat intelligence trends, including zero-day attacks, and integrated findings into Securonix’s ATS system development saving client’s 110 manual hours monthly.
  • Constructed and operated a comprehensive threat intelligence system, filtering false positives and delivering detailed reports to stakeholders preventing 40+ critical incidents.
  • Enhanced the Autonomous Threat Sweep system based on customer feedback, introducing new features and capabilities for improved threat intelligence gathering and analysis, while ensuring data accuracy through custom Regex parsers.
  • Spearheaded MISP adoption for threat intelligence sharing and installed a comprehensive attacker database, enabling quick identification of threats and faster response times.
  • Conducted threat modeling exercises, collaborating with development teams to implement security controls and countermeasures against potential attack vectors and vulnerabilities in critical systems for clients from diverse industries.
  • Developed an open-source DevSecOps framework, seamlessly integrating security practices into the CI/CD pipeline for automated security testing, including the detection of vulnerabilities, misconfigurations, and anomalies.
  • Implemented robust hardening measures across the entire CI/CD pipeline, complying with industry-leading frameworks (NIST, MITRE, OWASP, CIS), and reducing critical vulnerabilities by 40%.
  • Designed and built custom security tools and automation scripts, streamlining security testing, threat detection, and remediation within the CI/CD workflow, improving overall efficiency by 25%.
  • Engineered customized penetration testing tools aligned with the MITRE ATT&CK framework, OWASP Top 10, and SANS Top 20, improving the comprehensiveness and accuracy of security assessments by 35%.
  • Leveraged container security technologies, such as Docker while Conducting rigorous scanning of container images, networks, hosts, and systems, identifying and mitigating 95% of vulnerabilities and misconfigurations.
  • Optimized security tool configurations, resulting in a 50% reduction in false positives. Leveraged powerful log analysis and correlation tools to enhance the accuracy and efficiency of security monitoring within the CI/CD environment.
  • Monitored, analyzed, and responded to global incidents reported through the ticketing queue, collaborating with NetOps, IT, and Engineering teams across 19 countries.
  • Strengthened intrusion detection and endpoint security systems, reducing false positives and enhancing Threat Modeling using solutions like CrowdStrike Falcon, Carbon Black, Darktrace, and Cylance.
  • Led the transition to cloud-based ticketing systems (ServiceNow, Jira Service Desk) for improved scalability and efficiency.
  • Revamped motorized Phishing/SPAM handling, reducing noise by 80% using solutions such as Proofpoint and Mimecast.
  • Automated case generation and handling through ServiceNow and Splunk Phantom.
  • Spearheaded the development of incident response playbooks using SOAR platforms like Phantom and Cortex XSOAR.
  • Brought in machine learning based PhishER platform, to address high volume of potentially malicious email messages, while fine tuning PhishML algorithm case-by-case to prioritize and differentiate malicious mails with least false positives.

During my tenure as a teaching assistant at Northeastern University, I had the privilege of instructing a remarkable cohort of master’s students in the domain of computer networks and security. My responsibilities included designing and delivering customized lectures, labs, and projects that catered to their unique learning needs, fostering a highly interactive and engaging educational milieu for my students. Over the span of the semester, I observed my students evolve and enhance their proficiencies in ways that were truly inspiring. Witnessing their accomplishments and observing the impact of my pedagogy and mentorship on their lives was a profoundly fulfilling experience that I will always treasure. As a teaching assistant, I made it my foremost priority to furnish my students with constructive feedback on a regular basis, aiding them in recognizing areas where they could improve and offering them the necessary support and guidance to unlock their full potential. I am overwhelmingly grateful for the opportunity to have developed my teaching and mentorship abilities at Northeastern University and am eager to continue assisting students in accomplishing their aspirations and maximizing their potential in the years to come.

  • Successfully resolved complex hardware, network, and operating system-related issues, demonstrating an in-depth understanding of advanced troubleshooting techniques.
  • Held the crucial responsibility of being the designated on-call Subject Matter Expert (SME) for Quality Assurance and Average Handling Time, ensuring swift and effective resolution of critical network incidents during after-hours support.
  • Displayed exemplary expertise in crafting comprehensive training manuals, effectively communicating complex cybersecurity concepts to diverse audiences and promoting a culture of continuous learning and upskilling.

Stay In Touch

“Hey there, tech-savvy friend! If you want to be a hero and help us keep our cyber security on point, just drop your email in my on-call list. Don’t worry, I won’t spam you with cat videos or share your info. Thanks for being the Batman to our Gotham City!”