My Background
Personal Profile
Skilled Certified professional, I bring a dedicated and motivated approach to the Cyber security Field.
My experience extends to Incident response, and tackling real-world incidents, where I've demonstrated proficiency in combating Ransomware threats, uncovering elusive malwares, and navigating the dynamic landscape of evolving cyber attacks.
​
With Multi Tools experience:
EDR/MDR : - Sentinel One(MDR), Qualys EDR, Microsoft defender for business
XDR : - Bit Defender, CrowdStrike (Falcon).
Vulnerability Assessment : - Nessus, Qualys VMDR.
Log Analysis : - Chainsaw, Hayabusa, LogParser, EvtxECmd.
DFIR : - Redline, FTK Imager, Cyber triage, OS Forensics
Memory Analysis :- Volatility 3, WinPmem
IDS/IPS : - Suricata
File Recovery :- Photorec
Eric Zimmerman :- Kape, AmcacheParser, ShimCache parser, JLECmd, LECmd, SBECmd, Registry Explorer
TimeLine creation :- MFTECmd, Log2Timeline (Plaso)
Curriculum Certifications
Professional Credentials
2017-2020
Guru Nanak dev university, Amritsar
Degree:- Bachelor of Computer Application.
​
Went through Multiple courses
Like C, C++, Python, DBMS, JAVA, and Information technology, Digital electronics, Operatingsystem, Computer networks, Data structure, Web Technologies
05/2024 - Present
Company Name:
Ankura Consulting Group
Designation :- Cybersecurity Incident response, Associate
05/2021 -09/2022
Designation :- Cyber - Operation Executive
​
-
Monitored security alerts, conducted log analysis.
-
Collaborated with senior cybersecurity professionals.
-
Documented security incidents
-
Ensured effective cybersecurity operations.
-
Stayed updated on latest threats.
-
Actively handled security events, security awareness.
Company Name:
Infosys Ltd
09/2022 - 05/2024
Company Name:
ConnectWise
Designation :- Cyber Security Analyst L2
​
-
Guided clients through incident response.
-
Advised clients on security strategies.
-
Handled various cybersecurity threats.
-
Assisted in addressing findings from scans and tests.
-
Managed event sets for threat resolution.
-
Monitored systems for breaches and activity.