Information Security Engineer II with 5 years & 3 months of experience in financial sectors. Implemented security measures and protected valuable data. Perform regular testing of security measures and data processing systems. Cyber Security professional with a strong interest in Ethical Hacking, Penetration Testing, Vulnerability Assessment and Analysis.
Skills
Information Security Governance • Technology Risk Management • Security Incident Management • IT Security Engineering • Data Security .MAS Technology Risk Management Guidelines, • MAS CyberHygiene Notice • PDPA • PCI DSS • IT Project Management • ITIL • Vendor Management • Outsourcing Management,Cyber Risks and Controls Management; ✓ Data Protection; ✓ IT Security Service Management; ✓ People Management; ✓ Department Budget Management; ✓ Vendor Governance: Outsourcing and SLA Management.
Information Security Engineer II Ecommerce Company
- Implementing security controls to enable clear visibility, prompt response to events, and adherence to regulatory compliance requirements.
- Deployment, Configuration and Management of cloud native security tools to automate security management, monitoring and related processes to reduce risk.
- Conducting vulnerability scanning on internal and external resources to identify and mitigate identified vulnerabilities with Nessus/TenableIO and TwistLock.
- Providing solutions for the end-to-end security requirements of various clients globally which includes, Web Application Audit, Mobile Application Audit, Vulnerability Assessment, Penetration testing, Cloud Security Review, Source Code Reviews and Configuration Review.
- Planning & analyzing the security testing scope based on requirements and provide best security practices
- Level Change, Infrastructure Level Change, Configuration Level Change, GUI Level Change, API Level Change and Cosmetic Change.
Information Security Engineer
- Managing Symantec Endpoint Protection (SEP) Antivirus solutions(Manage policies/Hash or malicious exe blocks/Domain or IP blocks/Firewall
- Continuous monitoring of SecureWorks Security events, logs, Redcloak, MS ATP, Carbonblack threat event, Zscaler proxy, Digital Shadows for band protection.
- Proficient in different Security Analysis Tools like Burp Suite, Fiddler, OWASP ZAP, Acunetix, Qualys, Nessus, NMAP etc.
- Performing web services penetration Testing using manual and automation tool approach.
- Performing secure configuration reviews for firewalls, network architectures, application servers, databases, middleware etc.
- Assessed Web application and Mobile application, Web Services/API’s, Application flow review. Analyzing Kibana logs for investigation purpose of traffic on servers.
- Vulnerability scan reports and work on the vulnerabilities on our Web server/Application server/other security applications. Possess practical end-to-end knowledge and hands-on experience of IT Security technologies and IT Security Service Management;
Information Security Analyst
- Worked as “Security Analyst” in Information Security and Threat Management Team Analyse day to day threats/Attacks/Events/Offences/Alerts and mitigate them
- Tuning of the existing rules and Building Blocks for managing the False Positives in QRADAR Scheduling of monthly and quarterly vulnerability scans for the remediation/ patching of the vulnerabilities
- Diagnosed the system security alerts via various tools and shared reports as part of the ITIL process with corresponding teams for further actions
- Expert in preparing detailed practices and procedures on technical processes, analyzed security incidents to reduce risk.
- Implemented security operations through the profiling of assets & matching against the national vulnerability database to mitigate risk, minimize false positives, & prioritize high-risk assets
- Conducted Security Threat Intelligence analysis and remediation. Executed Security Vulnerability
- Worked on enhancing discovery, distributed engine, design and implementation experience in Delinea Integrated LDAP & designed password policies as per organizational requirements
CERTIFICATIONS
- ERTIFICATIONS/COURSES Certified Ethical CyberArk Trustee Certifica
- Hacker(CEH V10) Malware Analysis and Triage (TCM) Splunk Fundamentals
- Privileged Password Security Training Certification by Delinea
- Introduction to CyberSecurity Tools & Cyber Attacks by IB
- CyberSecurity Fundamentals by IBMSkill Builds