0% found this document useful (0 votes)
83 views1 page

Cybersecurity Analyst Profile Summary

Uploaded by

Kshitij Malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views1 page

Cybersecurity Analyst Profile Summary

Uploaded by

Kshitij Malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

CONTACT

+91 8603030130
TANMAY KUMAR
OBJECTIVE
[email protected]
Highly motivated and result-driven individual with 2 years of experience; targeting
LinkedIn assignments in Cyber Security domain in a dynamic environment to leverage skills
and expertise, preferably in Delhi NCR or Bengaluru.

EDUCATION PROFILE SUMMARY


 SOC Cyber Security Analyst with proficiency in scripting languages like Python
2022: B.E. (Instrumentation) | M S Ramaiah and PowerShell, along with a strong understanding of cybersecurity
Institute Of Technology, Bangalore principles, threat detection and vulnerability management.
2017: 12th | Holy Mission Secondary School,  Currently working as an Associate Information Security Analyst at Koch
Patna Business Solution India.
2015: 10th | DA.V. Public School, Patna  Proficient in leveraging advanced SIEM tools and automation scripts to
enhance incident response efficiency and streamline SOC operations,
CORE COMPETENCIES resulting in reduction in manual security tasks.
 Created an innovative tool for early detection of impersonation threats by
 Malware Analysis identifying similar domains and preventing potential breaches.
 Security Risks Identification  Expertise in integrating security tools, conducting security assessments and
 Data Loss Prevention continuously improving security measures.
 Threat Analysis  Highly skilled in malware analysis, threat assessment, phishing prevention
 Automation Processes and swift incident response.
 Cyber Security Practices
 Incident Response WORK EXPERIENCE
 Regulatory Compliance Koch Business Solution India, Bengaluru
 Risk Mitigation Associate Information Security Analyst | Jul’22 – Present

TECHNICAL SKILLS Highlights:


 Pioneered the adoption of automation, leading to a notable 50% reduction in
 JavaScript manual security tasks.
 Python  Implemented a new SIEM (Security Information and Event Management)
system which enhanced incident detection rates by 40%.
 ServiceNow
 Delivered security awareness training to over 3,000 employees which
 CrowdStrike
improved the overall security awareness within the workforce.
 Cortex & XOAR  Performed log analysis using either Splunk or Anvilogic.
 Splunk  Executed IDS/IPS, SIEM, DLP and endpoint security solutions which led to a
 Proofpoint significant 79% decrease in malicious attacks.
Projects:
SOFT SKILLS  Cyber Security Awareness: Delivered presentations designed to inform and
educate new employees about various cyber threats; increased their
 Analytical
awareness and understanding of potential risks in the digital environment.
 Problem-solving  Alert Creation: Executed Splunk to XOAR transition, crafting queries to flag
 Detail-oriented malicious emails from KnowBe4; sent alerts to XOAR for playbook creation;
 Teamwork developed playbooks to enhance response to phishing threats.
 Communication  Allow/Block USB via ServiceNow: Designed a comprehensive workflow in
ServiceNow, featuring dynamic forms and scheduled scripts to regulate USB
ACADEMIC PROJECT blocking and permissions using the CrowdStrike API.
Dog Trainer Robot | Dec’21 – May’22  Look Alike Domain Detector: Created a tool to counter impersonation threats
by identification of similar domains through utilization of the WHOIS API to
 Created a pet training system through gather domain details and the FuzzyWuzzy library for accurate string
utilization of Machine Learning technology, matching; achieved a significant reduction in impersonation risks by enabling
which incorporated sensors for tracking pet the detection and alerting of potential threats.
activity.
 Utilized Machine Learning algorithms to
INTERNSHIP
interpret and comprehend pet actions, Koch Business Solution India, Bengaluru
facilitating more efficient training methods. Information Security Intern | Jan’22 – Jul’22
 Improved training outcomes by offering Highlights:
positive reinforcement whenever pets
 Implemented an extensive DLP (Data Loss Prevention) strategy which resulted
successfully executed commands.
in a 90% decrease in data leakage incidents.
PERSONAL DETAILS  Examined security incidents which led to a reduction in the time required to
detect and respond to such incidents by 24 hours within the initial year.
Date of Birth: 22nd August 1999  Identified and probed security breaches, providing recommendations for
Languages Known: English & Hindi remediation approaches in collaboration with leadership.
Address: Bengaluru, Karnataka  Conducted investigations into malicious phishing emails, domains, and IPs
utilizing open-source tools & advised on appropriate blocking measures.

You might also like