Azhar Hassan
Email:[email protected]
Contact:+91-8801207501
CAREER SNAPSHOTS:
A competent professional with close to 7 years of experience in multiple Cyber Security Domains.
Currently working for Micron Technology, previously worked with Wells Fargo, IBM, Tech Mahindra, and DELL.
Experience in Incident Handling, Threat Hunting, Forensics, SIEM, Network Attacks, Phishing/Spam Investigation,
log Analysis, Basic Static, and Dynamic Malware Analysis, and Capture the Flag.
Completed SANS (508): Advanced Incident Response, Threat Hunting, and Digital Forensics.
Aspiring for OSCP.
PROFESSIONAL EXPERIENCE:
Current Organization:
Working with Micron Technology (June 2020 to till date)
Designation: IT Security Analyst
Job Profile:
Responsible for handling High Severity and complex incidents.
Investigating Insider threats attacks.
Performing threat hunting activities to find anomalies.
Performing forensics on critical cases.
Collaborating with the legal and ER team to determine the exfiltration of data.
Analyzing Events to understand threat campaign techniques and lateral movements in the incident.
Investigating various types of Cyber-attacks such as Network, Host & Email attacks.
Analyzing alerts and data for false positive/true positive outcomes.
Performing static and dynamic malware analysis.
Preparing SOP (Standard Operations Procedures) & baseline for SIEM activities.
Handling DLP Incidents and Involved with the legal team if company data is being sent to unauthorized
locations.
Tools Used: Splunk, Encase, FTK, Axiom, SIFT, Redline, Volatility, Wireshark, and open-source forensic tools.
Previous Organization:
Wells Fargo (March 2019 to June 2020)
Designation: Information Security Analyst
Job Profile:
Handling real-time incidents generated by the SIEM, performing analysis and report through IR tool.
Actively worked on Ransomware attacks affecting third-party customers and vendors.
Investigating phishing campaign and handling the case end to end.
Co-coordinating with multiple teams on the incident for remediation.
Perform dynamic analysis on the malware samples that we get from alerts with Sandboxes, check the
IOCs in the logs with the help of the SIEM tool
Handling DDOS Incidents notified from partners and making sure it has not affected the organization or
line of business.
Analyzing attack patterns and recommending appropriate containment and remediation plan.
Perform proactive log analysis to find the threats targeting organizations’ networks.
In-depth Link Analysis, finding the magnitude of an Attack, and performing Root-Cause Analysis.
Collect and provide actionable intelligence inputs from various internal & external sources.
Worked at IBM (January 2017 – February 2019)
Designation: IT Security Analyst
Job Profile:
Experience in Information Security, with emphasis on security operations, incident management, and
security event analysis through SIEM.
Worked in 24x7 SOC team, offering log monitoring, security information management, global threat
monitoring, anti-phishing, and anti-malware.
Prepared SOP (Standard Operations Procedures) & baseline for SIEM activities.
Providing Security Intelligence like latest threats, News, Advisories, Patch Releases via reports and
dashboards, etc.
Management and Administration of Antivirus at the Enterprise level and products like MacAfee E
policy orchestrator, McAfee virus scan enterprise
Performing all daily BAU activities of MacAfee EPO/Virus scan enterprise.
Troubleshooting all the issues related to MacAfee EPO/Virus scan enterprise.
Security event analysis and intrusion detection by review and analysis of events generated by various
components including IDS/IPS, firewalls, Routers, DB, OS, and various types of security devices.
Worked at Tech Mahindra (Nov 2015 to Jan 2017)
Designation: Associate Technical Support.
Job Profile:
Worked as part of 24*7*365 security event monitoring team and performed analysis, detection, triage
using QRadar SIEM.
Responding to alerts from various monitoring/detection systems and platforms within defined SLAs.
Part of Threat Intelligence team to keep an eye on the external Resources to new Vulnerabilities, attacks
s, etc.
Worked in IAM Creating new Roles and Role Modification.
Performed a formal audit of Active Directory and completed reports on recommendations.
Performed audits of the information technology environments, operating systems, and applications to
ensure compliance with policies and procedures.
Removing the roles which are irrelevant to the user according to their profiles.
Create or delete folders on shared drives on the server by following policies and procedures after a
certain level of approvals.
Worked at DELL International Services India Pvt Ltd
(July 2014 to Mar 2015)
Designation: Technical Support.
Job Profile:
Performing Initial triage on security alerts.
Monitoring and detection of security incidents.
Escalating incidents to the concerned team.
Escalations of events depending on the severity.
Creating tickets for alerts as per the severity and based on category.
PROFESSIONAL QUALIFICATION:
Bachelor of Technology in Computer Science and Engineering, 2013.
College - St. Peters Engineering affiliated to JNTU-Hyderabad.
CERTIFICATIONS:
Certified Ethical Hacker.
Splunk Fundamentals 1 & 2
Completed SANS 508 course - Advanced Incident Response, Threat Hunting, and
Digital Forensics
Completed ACM Cyber Threat Hunting Level 1 certification.
Qualys Guard Vulnerability Management.