0% found this document useful (0 votes)
91 views3 pages

Sivaji Miriyala 3 6exp Miriyalasivaji945@gmail Com

Uploaded by

V Naveen Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
91 views3 pages

Sivaji Miriyala 3 6exp Miriyalasivaji945@gmail Com

Uploaded by

V Naveen Reddy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

SECURITY ANALYST

(Cyber Security and Information Security)

Email: miriyalasivaji945@gmail.com Name: Miriyala Sivaji


Mobile: +91 9398329677

PROFILE SUMMARY:
I have 3.6 years of experience as a SECURITY ANALYST (L1) in the field of cyber security operations
for 24*7 SOC environment.
 Strong Experience as SOC Analyst & securing Enterprise Environment using SIEM Technology
 Working as Security Analyst for SOC 24*7 environments.
 Expertise in SOC (Security Operations Centre) Operations methodology such as Incident
Handling, Incident Investigation, Logs monitoring, Network traffic monitoring, real time
security event handling, log analysis, identifying and classifying attempted compromises to
networks through heuristics identification of suspect traffic.
 Experience in device configuration for various devices and applications including Firewalls,
IDS, IPS, Windows servers, Linux servers, Database servers and other applications as per the
custom requirements.
 Good knowledge and understanding of Splunk/Sentinel/QRadar Architecture and its
components.
 Knowledge on Implementation of Sentinel – Log source integration Linux, windows,
defender sources etc. and troubleshooting
 Good knowledge in understanding the log flow from Syslog to Splunk/Sentinel.
 Strong hands-on experience with Splunk, Azure Sentinel and Q Radar SIEM tool and basic
Knowledge on LogRhythm and Exabeam.
 Strong hands-on experience dealing with IBM QRadar Offences/LogRhythm Alarms/Splunk,
creating cases and responding based on SLA’s.
⮚ Experience in Anti Phishing, Anti Malware, Anti-Spam, Safe Links, Safe Attachments.
⮚ Analyzes and assesses vulnerabilities in the infrastructure (OS, Port, Software, Hardware,
and Networks).
⮚ Network Security: Monitoring of IDS/IPS, Firewall, Proxy servers’ logs integrated to SIEM
tool.
⮚ End Point Security: Investigating of end user and entity incidents using UEBA and Advanced
Entity Analytics
⮚ Application Security: Scanning of applications using Application security tools, identifying
application vulnerabilities, and sending the reports to Application developers to fix the bugs
listed in the application.

TECHNICAL SKILLS SUMMARY


 SIEM &SOC : IBM Q radar, Splunk
 End point security : MS defender, Sentinel one, XDR(cortex)
 Network Security : FortiGate Firewall, IDS/IPS.
 Phishing Mails : O 365 Defender
 System Security : Knowledge of windows and Linux servers
 Ticketing tools : Service Now
EXPERIENCE

Organization: WIZART TECHNOLOGY PVT LTD


Designation: Security Analyst
Duration: Nov 2020 to till date.
⮚ Primary responsibilities include Monitoring Splunk and Triaging all security events coming into
SOC from multiple sources.
⮚ Monitoring and analysis of events generated by various security and network tools like
Firewalls, Proxy servers, AV, IPS/IDS, load balancer’s database, System Application, Cloud
(Amazon, Azure and Google) Windows and Linux servers etc...
⮚ Working as Security Analyst for SOC 24*7 environments (Splunk).
⮚ Security Incident Response: Responsible for monitoring of security alerts. Analysis of logs
generated by appliances, investigation, and assessment on whether the incident is false positive
or True positive.
⮚ Use SIEM tools (Q Radar and Splunk) to detect possible signs of security breaches and perform
detailed investigation to confirm successful breach. Perform root cause analysis (RCA) and
appropriately handle the incident as per defined Incident Management Framework.
⮚ Using Active Directory will check the user’s activity sign in logs and access privileges.
⮚ Following end to end Incident Investigation and Incident Response process, ensuring to close
the investigation within defined SLA.
⮚ Escalation of security incidents to concerned teams and their management and follow-up for
closure.
⮚ Creating tickets in Service now Tool and tracking the status of the incidents.
⮚ Analysis of daily and monthly reports for incident management and compliance.
⮚ Coordinating with Network team, Server team regarding activities and technical issues.
⮚ Creating vulnerability and remedy reports and reporting them to users.
⮚ Finding the Critical servers and application inventory from respective business owners and
scheduling the scan weekly, monthly and Quarterly basis.
⮚ Scanning the environment using (Nessus) finding the vulnerabilities based on the business units
and sending the report to respective business owners.
⮚ Knowledge sharing session with the team members whenever complex incident issues are
raised and lessons learned from other team members.

EDUCATIONAL QUALIFICATIONS:

⮚ Master of Technologies (Structural Engineering) from JNTUH University (2016 – 2018).

PERSONAL PROFILE:

Date of Birth : 31/07/1993


Gender : Male
Marital Status : Single
Languages Known : English, Hindi and Telugu

DECLARATION:
I hereby declare that the information furnished above is true to the best of my Knowledge.

Place: Hyderabad

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy