0% found this document useful (0 votes)
20 views2 pages

Anusha B

Anusha is an Information Security Analyst with over 5 years of IT experience, including 3 years in Information Security. She has expertise in threat analysis, security monitoring, and SIEM tools like McAfee Nitro and IBM QRadar, and is currently employed at Tech Mahindra. Her responsibilities include real-time event monitoring, log analysis, and preparing security incident reports.

Uploaded by

mpadala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views2 pages

Anusha B

Anusha is an Information Security Analyst with over 5 years of IT experience, including 3 years in Information Security. She has expertise in threat analysis, security monitoring, and SIEM tools like McAfee Nitro and IBM QRadar, and is currently employed at Tech Mahindra. Her responsibilities include real-time event monitoring, log analysis, and preparing security incident reports.

Uploaded by

mpadala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

RESUME

Anusha
Email ID: [email protected]
Contact: +91 7207294209

Professional Summary:

 Over all 5+ years of experience in Information Technology.


 Having 3+ years relevant experience in Information Security and currently working as Security
Analyst (Security Operation Center team)
 Hands on experience on Threat analysis and Security Monitoring and Operation.
 Experience on SIEM (Security Information and Event Management) tools like Monitoring real-
time events using McAfee Nitro , IBM QRadar tools.
 Preparing daily, weekly and monthly report as per client requirement.
 Investigating and creating case for the security threats and forwarding it to Onsite SOC team for
further investigation and action.
 Experience on performing log analysis and analyzing the crucial alerts at immediate basis.
 Filling the Daily health checklist.
 Reporting weekly / monthly dashboards to customer.
 Recognizing attacks based on their signatures.
 Monitoring and carrying out second level analysis incidents.
 Have knowledge in device integration, alarm creation and watch list creation in ESM.
 Knowledge of security concepts such as cyber-attacks and techniques, threat management, risk
management, incident response etc.
 Knowledge in malware analysis.
 Experience on ArcSight (Device Integration, Troubleshooting connector and ESM issues,
upgradation, Incident response and resolution).
 Develop ESM rules, reports, dashboards, data monitors, and active channels.
 Assist in the proper operation and performance of Arc sight ESM, Loggers and connector.
 In-depth knowledge of security concepts such as cyber-attacks and techniques, threat
management, risk management, incident response etc.
 Understanding and troubleshooting experience on security operation.

Technical Skills:

 SOC (Security Operation Center)


 SIEM(Security Information and Event Management) Tool: McAfree Nitro, IBM Qradar
 Ticketing tools: Service now, Manage Engine

Education:

 Completed B.Tech(ECE) from JNTU, Hyderabad in 2011.


Work Experience:

 Currently Working as Information Security Analyst with Tech Mahindra from April 2016 to till
date.

Professional Experience:

Company: Tech Mahindra


Project: Security Monitoring and Operations.
Role: Security Analyst
Responsibilities:
 Monitoring real-time events using SEIM tools like McAfee Nitro, IBM QRadar .
 Ad hoc report for various event sources customized reports and scheduled reports as per
requirements.
 Collecting the logs of all the network devices and analyse the logs to find the suspicious
activities.
 Investigate the security logs, mitigation strategies and responsible for preparing generic security
incident reports.
 Responsible to preparing the root cause analysis reports based on the analysis.
 Creating case for the suspicious issue and forwarding it to Onsite SOC team for further
investigation.
 Performing investigation of high priority alerts to detect Threats/Incidents.
 Analysing data generated by different analytical models based on end device type.
 In depth analysis on the user behaviour, end point and network behaviour based on analytical
models
 Administrating various incidents/security alerts triggered in SIEM tool.
 Monitoring 247 for Security Alerts and targeted phishing sites by using SIEM tool with help of
technologies such as Watermark, Referrer, Abuse mailbox and Similar sounding domains
 Website Anti-Malware and Defacement monitoring and real-time alerting based on anomalies
detected.
 Comparing previous day’s incidents with the Analytical models to identify persistent threats
 Carrying out log monitoring and incident analysis for various devices such as firewalls, IDS, IPS,
database, web servers and so forth.
 Monitoring of predefined filters, queries, Rules, Dashboard etc. for Alerts.

(Anusha B)

You might also like