0% found this document useful (0 votes)
37 views3 pages

Azhar Hassan

Azhar Hassan is an IT Security Analyst with nearly 7 years of experience in Cyber Security, currently employed at Micron Technology. His expertise includes incident handling, threat hunting, and forensics, with previous roles at Wells Fargo, IBM, Tech Mahindra, and DELL. He holds a Bachelor's degree in Computer Science and several certifications, including Certified Ethical Hacker and SANS 508.

Uploaded by

mpadala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views3 pages

Azhar Hassan

Azhar Hassan is an IT Security Analyst with nearly 7 years of experience in Cyber Security, currently employed at Micron Technology. His expertise includes incident handling, threat hunting, and forensics, with previous roles at Wells Fargo, IBM, Tech Mahindra, and DELL. He holds a Bachelor's degree in Computer Science and several certifications, including Certified Ethical Hacker and SANS 508.

Uploaded by

mpadala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Azhar Hassan

Email:[email protected]
Contact:+91-8801207501

CAREER SNAPSHOTS:
 A competent professional with close to 7 years of experience in multiple Cyber Security Domains.

 Currently working for Micron Technology, previously worked with Wells Fargo, IBM, Tech Mahindra, and DELL.

 Experience in Incident Handling, Threat Hunting, Forensics, SIEM, Network Attacks, Phishing/Spam Investigation,
log Analysis, Basic Static, and Dynamic Malware Analysis, and Capture the Flag.

 Completed SANS (508): Advanced Incident Response, Threat Hunting, and Digital Forensics.

 Aspiring for OSCP.

PROFESSIONAL EXPERIENCE:

Current Organization:

Working with Micron Technology (June 2020 to till date)


Designation: IT Security Analyst

Job Profile:
 Responsible for handling High Severity and complex incidents.
 Investigating Insider threats attacks.
 Performing threat hunting activities to find anomalies.
 Performing forensics on critical cases.
 Collaborating with the legal and ER team to determine the exfiltration of data.
 Analyzing Events to understand threat campaign techniques and lateral movements in the incident.
 Investigating various types of Cyber-attacks such as Network, Host & Email attacks.
 Analyzing alerts and data for false positive/true positive outcomes.
 Performing static and dynamic malware analysis.
 Preparing SOP (Standard Operations Procedures) & baseline for SIEM activities.
 Handling DLP Incidents and Involved with the legal team if company data is being sent to unauthorized
locations.

Tools Used: Splunk, Encase, FTK, Axiom, SIFT, Redline, Volatility, Wireshark, and open-source forensic tools.
Previous Organization:

Wells Fargo (March 2019 to June 2020)


Designation: Information Security Analyst

Job Profile:
 Handling real-time incidents generated by the SIEM, performing analysis and report through IR tool.
 Actively worked on Ransomware attacks affecting third-party customers and vendors.
 Investigating phishing campaign and handling the case end to end.
 Co-coordinating with multiple teams on the incident for remediation.
 Perform dynamic analysis on the malware samples that we get from alerts with Sandboxes, check the
IOCs in the logs with the help of the SIEM tool
 Handling DDOS Incidents notified from partners and making sure it has not affected the organization or
line of business.
 Analyzing attack patterns and recommending appropriate containment and remediation plan.
 Perform proactive log analysis to find the threats targeting organizations’ networks.
 In-depth Link Analysis, finding the magnitude of an Attack, and performing Root-Cause Analysis.
 Collect and provide actionable intelligence inputs from various internal & external sources.

Worked at IBM (January 2017 – February 2019)


Designation: IT Security Analyst

Job Profile:
 Experience in Information Security, with emphasis on security operations, incident management, and
security event analysis through SIEM.
 Worked in 24x7 SOC team, offering log monitoring, security information management, global threat
monitoring, anti-phishing, and anti-malware.
 Prepared SOP (Standard Operations Procedures) & baseline for SIEM activities.
 Providing Security Intelligence like latest threats, News, Advisories, Patch Releases via reports and
dashboards, etc.
 Management and Administration of Antivirus at the Enterprise level and products like MacAfee E
policy orchestrator, McAfee virus scan enterprise
 Performing all daily BAU activities of MacAfee EPO/Virus scan enterprise.
 Troubleshooting all the issues related to MacAfee EPO/Virus scan enterprise.
 Security event analysis and intrusion detection by review and analysis of events generated by various
components including IDS/IPS, firewalls, Routers, DB, OS, and various types of security devices.

Worked at Tech Mahindra (Nov 2015 to Jan 2017)


Designation: Associate Technical Support.

Job Profile:
 Worked as part of 24*7*365 security event monitoring team and performed analysis, detection, triage
using QRadar SIEM.
 Responding to alerts from various monitoring/detection systems and platforms within defined SLAs.
 Part of Threat Intelligence team to keep an eye on the external Resources to new Vulnerabilities, attacks
s, etc.
 Worked in IAM Creating new Roles and Role Modification.
 Performed a formal audit of Active Directory and completed reports on recommendations.
 Performed audits of the information technology environments, operating systems, and applications to
ensure compliance with policies and procedures.
 Removing the roles which are irrelevant to the user according to their profiles.
 Create or delete folders on shared drives on the server by following policies and procedures after a
certain level of approvals.

Worked at DELL International Services India Pvt Ltd


(July 2014 to Mar 2015)
Designation: Technical Support.

Job Profile:
 Performing Initial triage on security alerts.
 Monitoring and detection of security incidents.
 Escalating incidents to the concerned team.
 Escalations of events depending on the severity.
 Creating tickets for alerts as per the severity and based on category.

PROFESSIONAL QUALIFICATION:

Bachelor of Technology in Computer Science and Engineering, 2013.


College - St. Peters Engineering affiliated to JNTU-Hyderabad.

CERTIFICATIONS:
 Certified Ethical Hacker.

 Splunk Fundamentals 1 & 2

 Completed SANS 508 course - Advanced Incident Response, Threat Hunting, and
Digital Forensics

 Completed ACM Cyber Threat Hunting Level 1 certification.

 Qualys Guard Vulnerability Management.

You might also like