Abhishek J.

Abhishek J.

Information Security Analyst

Karjat , India

Experience: 5 Years

Abhishek

Karjat , India

Information Security Analyst

25356.6 USD / Year

  • Notice Period: Days

5 Years

Now you can Instantly Chat with Abhishek!

About Me

To be in a challenging position in the field of Information Security and to work in an environment where I can utilize my skills, knowledge, and experience to enhance the growth of the organization....

Show More

Portfolio Projects

Description

 Monitoring logs and investigating suspicious activities for any anomalies and trigger
necessary actions using various security tools.
 Download and test new security software or technologies, recommend, schedule and perform
security improvements, upgrades and/or purchases and perform other duties as assigned
 Actively participate, plan, schedule internal information security health checks for different
customers.
 Able to analyze, respond to security incidents with manual or automated forensic analysis
tools& techniques. Shall aware & strongly follow incident management process.
 Performs real-time monitoring, security incident handling, investigation, analysis,reporting
and escalations of security events
 Perform vulnerability assessment in network for both internal andexternal security checks
 Risk assessment of firewall requests, vulnerability reports, assess, recommend & prepare
remediation plan to fix identified high vulnerabilities/risks.
 Optimization & fine tuning of security tools from administration & configuration perspective,
documenting all changes in policies.
 Build standard operating procedures for tools & process, define reporting & risk assessment
templates.
 Generate & present summary reports to present to management

Show More Show Less

Description

 Monitoring logs and investigating suspicious activities for any anomalies and trigger
necessary actions using various security tools.
 Download and test new security software or technologies, recommend, schedule and perform
security improvements, upgrades and/or purchases and perform other duties as assigned
 Actively participate, plan, schedule internal information security health checks for different
customers.
 Able to analyze, respond to security incidents with manual or automated forensic analysis
tools& techniques. Shall aware & strongly follow incident management process.
 Performs real-time monitoring, security incident handling, investigation, analysis,reporting
and escalations of security events
 Perform vulnerability assessment in network for both internal andexternal security checks
 Risk assessment of firewall requests, vulnerability reports, assess, recommend & prepare
remediation plan to fix identified high vulnerabilities/risks.
 Optimization & fine tuning of security tools from administration & configuration perspective,
documenting all changes in policies.
 Build standard operating procedures for tools & process, define reporting & risk assessment
templates.
 Generate & present summary reports to present to management

Show More Show Less

Description

 Monitoring logs and investigating suspicious activities for any anomalies and trigger
necessary actions using various security tools.
 Download and test new security software or technologies, recommend, schedule and perform
security improvements, upgrades and/or purchases and perform other duties as assigned
 Actively participate, plan, schedule internal information security health checks for different
customers.
 Able to analyze, respond to security incidents with manual or automated forensic analysis
tools& techniques. Shall aware & strongly follow incident management process.
 Performs real-time monitoring, security incident handling, investigation, analysis,reporting
and escalations of security events
 Perform vulnerability assessment in network for both internal andexternal security checks
 Risk assessment of firewall requests, vulnerability reports, assess, recommend & prepare
remediation plan to fix identified high vulnerabilities/risks.
 Optimization & fine tuning of security tools from administration & configuration perspective,
documenting all changes in policies.
 Build standard operating procedures for tools & process, define reporting & risk assessment
templates.
 Generate & present summary reports to present to management

Show More Show Less