0% found this document useful (0 votes)
32 views5 pages

Senior Security Analyst

Uploaded by

tom
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views5 pages

Senior Security Analyst

Uploaded by

tom
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Rajiv Singla

Senior Security Technical Analyst


E-mail: [email protected]
Phone no: 929 214 1840

Senior Security Technical Analyst


A highly skilled and results-driven Cybersecurity Analyst with extensive expertise in securing enterprise
environments and mitigating cyber threats. With a strong background in managing and securing Microsoft
environments, including Active Directory (AD), GPO, LDAP, Kerberos, and MFA, I specialize in implementing
robust security solutions that protect systems from evolving cyber risks. Proficient in the use of Security Incident
and Event Management (SIEM) tools, Intrusion Detection Systems (IDS), and various security protocols such as
DHCP, SMTP, HTTP, SSL, I ensure the integrity and security of organizational networks.

In addition, I am well-versed in Microsoft Defender, Microsoft Certificate Services, and cloud-based security
solutions such as Microsoft Entra ID and Conditional Access, enabling effective protection of both on-premises
and cloud-based infrastructures. My strong automation skills with PowerShell scripting help in streamlining
security processes, while my experience with Managed Detection and Response (MDR) vendors enhances
proactive threat detection.

With a proven track record of managing and responding to security incidents, conducting thorough forensic
analysis, and providing comprehensive threat intelligence, I am dedicated to safeguarding critical data and systems.
I possess the technical proficiency and hands-on experience required to identify vulnerabilities, manage security
risks, and continuously enhance the security posture of any organization.

Summary:
● Over 25+ years of experience in security incident response, forensic analysis, and cyber threat intelligence.
● Expertise in identifying and assessing threats to critical systems and data, with a strong ability to monitor,
respond to, and mitigate security risks.
● Skilled in responding to and investigating security intrusions and malicious activities, using advanced tools
and techniques.
● Proficient in performing thorough forensic analysis using security tools, ensuring accurate identification
and remediation of cyber threats.
● Strong experience in leading cybersecurity initiatives, managing security infrastructures, and ensuring
regulatory compliance.
● Expertise in network security, vulnerability management, threat hunting, and implementing security
controls based on global standards.
● Deep understanding of cybersecurity concepts and frameworks, including NIST, ISO 27001, and CIS
Controls, to provide effective and scalable protection.
● Hands-on experience with various cybersecurity tools, including SIEM systems (Splunk, QRadar), IDS/IPS
systems, endpoint security, and firewalls.
● Skilled in identifying vulnerabilities, monitoring anomalous behavior, and mitigating threats through
advanced detection systems and behavioral analytics.
● Proven track record in incident detection, response, and mitigation to protect clients from cyber threats,
data breaches, and financial losses.
● Holder of multiple industry certifications such as GSEC, CASP+, Security+, and more, demonstrating a
strong commitment to continuous learning and professional growth.
● Strong knowledge and experience with essential networking protocols, including DHCP, LDAP, SNMP,
SMTP, HTTP, and SSL, for seamless network management and threat analysis.
● Expertise in risk assessment, threat modeling, and vulnerability scanning to identify and remediate security
weaknesses in infrastructure.
● Excellent collaboration with internal teams, vendors, and third-party security experts to implement best
security practices and strategies.
● Conducted regular security audits, penetration testing, and vulnerability assessments to ensure systems and
networks remain resilient against evolving threats.
● Experience in creating and enforcing robust cybersecurity policies and procedures to ensure compliance
with global standards, laws, and regulations.
● Proficient in using SIEM solutions (Splunk, QRadar) for real-time monitoring, log management, and threat
analysis.
● Led efforts to quickly resolve incidents and performed root cause analysis to ensure preventive measures
are put in place.
● Extensive experience working with Managed Detection and Response (MDR) vendors to enhance proactive
threat detection and incident response capabilities.
● Strong expertise in implementing data loss prevention (DLP) strategies to protect sensitive data and ensure
compliance with privacy regulations.
● Previous experience working with government agencies to meet stringent cybersecurity requirements and
security standards.
● Applied anomaly detection and behavioral analytics to identify advanced persistent threats (APT) and
minimize false positives.
● Commitment to staying updated with emerging security trends and continuously improving existing
security measures to combat evolving threats.

Certifications & Education:


● AWS Certified Cloud Practitioner - By Amazon Web Services
● Gen AI
● CyberArk Certified Sentry (CCS)
● Microsoft Certified: Identity and Access Administrator Associate
● Microsoft Certified: Azure Security Engineer Associate
● Certified Information Systems Security Professional (CISSP)
● Microsoft Certified: Security, Compliance, and Identity Fundamentals
● Certified Information Security Manager (CISM)
● MarkLogic Fundamentals – By MarkLogic University
● Bachelor of Engineering (B.E.) in Electronics & Communication, from MIT Manipal, India 2000

PROFESSIONAL EXPERIENCE:
Silver Cross Hospital, New Lenox, IL
Jan 2020 – Present
Cybersecurity Analyst

Responsibilities:
● Led and coordinated the incident response team, ensuring effective containment and resolution of security
incidents.
● Perform daily monitoring and analysis of network traffic, system logs, and security incidents to identify
potential threats.
● Assist in the deployment, configuration, and management of security solutions such as firewalls, antivirus
software, and intrusion detection systems (IDS).
● Conduct vulnerability assessments and recommend remediation strategies to improve the organization's
security posture.
● Review and analyze SIEM data to identify abnormal behavior and suspicious activities across the network.
● Respond to and assist in the resolution of security incidents, documenting findings and providing follow-up
support.
● Maintain current knowledge of the latest security threats, vulnerabilities, and industry best practices.
● Assist in implementing and enforcing cybersecurity policies, procedures, and controls across the
organization.
● Support penetration testing and security audits to identify weaknesses in systems and network infrastructure.
● Work with other departments to ensure all endpoints are secured and comply with organizational security
policies.
● Participate in incident response planning and coordination, providing real-time analysis and support.
● Monitor email and web traffic for malicious activities such as phishing, spam, and malware attacks.
● Support in generating reports and documentation to track compliance with security standards.
● Assist in educating end-users on security best practices and threat awareness.

Heartland Financial USA, Inc. Rockford, IL


Feb 2015 – Dec 2020
Cybersecurity Analyst
Responsibilities:
● Led forensic investigations of security breaches, employing industry-standard tools like EnCase, FTK, and
X1 Social Discovery.
● Perform advanced threat analysis and respond to security incidents using SIEM platforms such as Splunk or
QRadar.
● Conduct in-depth forensic investigations of security breaches to determine their root cause and impact.
● Implement, configure, and manage security infrastructure tools such as firewalls, endpoint protection, and
network monitoring systems.
● Perform vulnerability scans and penetration testing to identify security gaps and develop mitigation
strategies.
● Develop and maintain security event logging, including reviewing event logs and performing anomaly
detection.
● Ensure continuous monitoring of critical systems and applications to detect unauthorized access or
malicious activities.
● Advise on security architecture improvements, identifying potential vulnerabilities and recommending
solutions.
● Collaborate with the IT and network teams to secure enterprise networking infrastructure and implement
encryption technologies.
● Implement and enforce security policies to align with industry standards such as ISO 27001, GDPR, and
NIST.
● Provide expert advice on data protection practices and manage risk assessments for new projects or system
implementations.
● Lead investigations and provide actionable recommendations to minimize the impact of security incidents.
● Coordinate with MDR vendors and other third-party services to enhance detection and response capabilities.
● Design and conduct security awareness programs for staff to educate on cybersecurity risks and best
practices.

Illinois Mutual Life Insurance Company, Peoria, IL


Sep 2010 – Jan 2015
Cybersecurity Incident Responder

Responsibilities:
● Lead incident response efforts during cyber incidents, including containment, eradication, and recovery.
● Analyze and correlate security events from various sources (SIEM, IDS/IPS) to identify signs of advanced
persistent threats (APT).
● Conduct post-incident reviews, providing detailed reports on lessons learned and preventative measures.
● Collaborate with cross-functional teams to ensure that the organization’s incident response capabilities are
continuously improved.
● Identify critical vulnerabilities in the organization’s systems and lead the remediation process.
● Develop and implement incident response plans and playbooks to standardize and streamline response
procedures.
● Work with external agencies or vendors to resolve cyber incidents, ensuring compliance with regulations
and security standards.
● Maintain documentation of security incidents, response actions, and recovery efforts for compliance audits.
● Provide leadership during major incidents, guiding the team through incident containment and remediation.
● Identify emerging threat trends and proactively work to enhance defenses and prevention strategies.
● Assist in forensic analysis of incidents to determine how threats bypassed existing security measures.
● Provide recommendations to senior management for improving security posture based on incident findings.
● Conduct vulnerability assessments and ensure the organization’s response mechanisms are robust against
evolving threats.

.
Chicago Medical Society, Chicago, IL
Jun 2005 – Aug 2010
Security Architect

Responsibilities:
● Led the security operations team, ensuring that daily security monitoring and threat detection systems were
operating effectively.
● Design and implement security architectures for complex IT infrastructures, ensuring scalability, reliability,
and security.
● Collaborate with stakeholders to develop security requirements and technical specifications for new
systems and applications.
● Review and approve security technologies and practices to ensure the highest level of protection against
evolving threats.
● Create and implement strategies for mitigating risks and vulnerabilities across enterprise applications,
networks, and systems.
● Lead efforts in implementing security controls, encryption technologies, and access management systems.
● Develop architectural roadmaps to ensure that security solutions align with business goals and regulatory
compliance requirements.
● Provide expert guidance on secure network architecture and firewall design, including segregation of duties
and DMZ configurations.
● Integrate advanced monitoring tools into the security infrastructure to provide early detection of intrusions
or unauthorized access.
● Perform regular security assessments of internal and external systems to identify and mitigate risks before
they become critical threats.
● Ensure compliance with relevant industry standards, such as ISO 27001, NIST, and CIS controls.
● Lead discussions around secure cloud adoption and provide strategies for securely integrating cloud
services.
● Provide technical leadership to security teams, ensuring they are aligned with the organization's strategic
objectives.
● Develop and maintain disaster recovery and business continuity plans to ensure minimal downtime during
security events.

Lutheran Social Services of Illinois, Des Plaines, IL


Jun 2001 – May 2005
Cybersecurity Risk Manager
Responsibilities:
● Developed and enforced security policies and procedures in alignment with regulatory frameworks like ISO
27001, PCI-DSS, and NIST CSF.
● Identify, assess, and manage security risks across enterprise IT infrastructure, focusing on high-priority
vulnerabilities.
● Develop risk mitigation strategies and work with senior leadership to prioritize cybersecurity investments.
● Perform regular risk assessments and implement continuous monitoring to evaluate the security posture of
the organization.
● Work with legal and compliance teams to ensure cybersecurity strategies comply with industry regulations
and government standards.
● Develop and maintain risk management frameworks and policies to ensure that security risks are mitigated
and controlled.
● Lead the identification and implementation of security measures to minimize organizational risks, including
third-party assessments.
● Provide reports and risk analysis to senior management, making data-driven recommendations for
improving security.
● Evaluate the impact of emerging cybersecurity threats and recommend proactive strategies to address them.
● Advise on risk-based decision-making processes and help balance security priorities with business needs.
● Monitor the effectiveness of security controls and make recommendations for improvements.
● Oversee the development and implementation of disaster recovery and incident response plans to reduce
potential security risks.
● Manage relationships with key external vendors, ensuring that their security practices align with
organizational risk management goals.
● Lead the establishment of business continuity processes to ensure security resilience and minimal
operational disruption in the event of a cyberattack.

You might also like