KEY STROKE ANALYSIS
→
Summary
Developed a 'KEY STROKE ANALYSIS' project focused on investigating security breaches and violations to enhance security forensics.
Ambitious and results-driven Cybersecurity professional with a strong foundation in system engineering, adept at incident monitoring, threat detection, and comprehensive IT operations. Leveraging robust troubleshooting skills, hands-on experience in networking, scripting, and continuous self-learning, I am seeking an entry-level Cybersecurity role to apply my technical expertise and passion for securing complex digital environments and contributing to organizational resilience.
Cybersecurity Operations Analyst
Chennai, Tamil Nadu, India
→
Summary
Managed 24/7 security operations, incident response, and system stability for networks and applications, ensuring optimal performance and robust security posture for critical services.
Highlights
Operated 24/7 monitoring for networks, systems, and applications, proactively identifying potential security threats and anomalies through real-time analysis.
Developed and implemented effective incident response plans, coordinating with internal and ISP teams to contain and remediate security breaches promptly.
Generated comprehensive daily, weekly, and monthly reports on server health, patch compliance, antivirus status, and cloud infrastructure metrics (AWS, Azure) to inform strategic decisions.
Monitored Windows and Linux servers for performance, uptime, and security using tools like PRTG, Sapphire Agent, CA Spectrum, and SIEM systems to aggregate, analyze, and respond to logs and security alerts.
Managed and responded to real-time alerts for service disruptions, high resource usage, and abnormal system behavior, minimizing operational impact.
Conducted regular health checks on CPU, memory, disk usage, and network traffic to ensure optimal server performance and prevent outages.
Configured and tailored Incident, Problem, and Change Management modules to align with organizational processes, enhancing workflow efficiency and reducing resolution times.
Administered Azure AD users, groups, and devices, managing access controls, storage permissions, and password policies to maintain secure and efficient identity management.
Deployed and configured Group Policies (GPOs) to enforce security settings and manage user configurations, ensuring compliance with organizational policies.
Assessed system stability, scalability, and security across installed Windows systems, coordinating system and server upgrades in consultation with IT managers.
Ensured critical services like DHCP, DNS, Active Directory, and backup systems remained operational and secured, maintaining business continuity.
System Engineer
Chennai, Tamil Nadu, India
→
Summary
Provided comprehensive IT support and system engineering services, focusing on software management, code review, and technical issue resolution for internal personnel and infrastructure.
Highlights
Provided base-level IT support to over 10 non-technical personnel, effectively resolving diverse technical issues and ensuring business continuity.
Installed, modified, and configured software, and resolved technical issues to ensure seamless system operations.
Performed over 5 code reviews of custom applications, identifying critical errors and software weaknesses, which reduced overall errors by 35%.
Installed, configured, and optimized Windows (10/11) and Ubuntu operating systems across desktops, laptops, and servers for both end-users and infrastructure roles.
Managed drivers for various hardware devices and configured essential software, including Microsoft Office, LibreOffice, and business-specific applications.
Handled regular system updates, security patching, and firmware upgrades on Windows and Ubuntu platforms to ensure system integrity and security compliance.
Troubleshot hardware issues involving RAM, hard drives, and peripheral devices on both Windows and Ubuntu platforms, minimizing downtime.
Configured static IP, DNS, and DHCP settings, and resolved network-related issues, including implementing VPN connections and managing access lists and firewall rules.
Coordinated with major laptop brands (Dell, HP, Lenovo) to log and escalate hardware issues under warranty or AMC support, ensuring timely repairs.
Diagnosed and documented hardware faults, including motherboard, keyboard, screen, battery, and SSD/HDD failures, for efficient resolution.
Facilitated Return Merchandise Authorization (RMA) and repair requests with vendor support teams, streamlining hardware maintenance workflows.
Maintained detailed asset tracking for laptops sent to and received from OEM service centers, ensuring accurate inventory and accountability.
Penetration Tester & Vulnerability Analyst
→
Summary
Collaborated with local business IT departments to conduct penetration testing and vulnerability assessments, enhancing their security posture.
Highlights
Worked with two local business IT departments to conduct comprehensive penetration testing and local vulnerability assessments.
Identified three new critical vulnerabilities and threats within their systems, providing actionable insights.
Provided detailed recommendations to reduce identified risks, significantly improving the businesses' security posture.
→
Bachelor of Computer Application
Computer Application
Courses
Networking
Scripting (Python, PowerShell)
Operating Systems (Microsoft Windows, Ubuntu, Macintosh)
Cybersecurity
Hardware and Software
→
High School Diploma
Computer Application with Science
Issued By
Microsoft
Issued By
Cisco Networking Academy
WireShark, Nessus, Nmap, Splunk, Metasploit, SIEM, PRTG, Sapphire Agent, CA Spectrum.
Python, PowerShell, HTML/CSS, SQL, JavaScript, Microsoft 365 Applications.
Windows (10/11, 2008 Servers), Ubuntu, Linux, OS X, UNIX, IOS, Android.
TCP/IP, DNS, HTTP, SSL/TLS, FTP, SMTP, SNMP, SSH, RDP.
Active Directory, Group Policy Management (GPO), DHCP, WDS, WSUS, Patch Management, Backup & Recovery, System Diagnostics, Hardware Troubleshooting, Asset Management, Incident Management, Problem Management, Change Management, Dual-Boot Configuration.
Azure, AWS.
Firewall Configuration, Antivirus (Windows Defender, TrendMicro), System Hardening.
Communication, Problem-Solving, Teamwork & Collaboration, Adaptability, Attention to Detail, Time Management.
→
Summary
Developed a 'KEY STROKE ANALYSIS' project focused on investigating security breaches and violations to enhance security forensics.