0% found this document useful (0 votes)
28 views2 pages

Raju Meher@Cyber Security Analyst-1

Uploaded by

ulberin123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views2 pages

Raju Meher@Cyber Security Analyst-1

Uploaded by

ulberin123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Raju Meher

CYBER SECURITY ANALYST

+91-7735783052 [email protected] linkedin/rajumeher Odisha, INDIA

EDUCATION PROFILE SUMMARY

Bachelor of Technology Proficient and detail-oriented Cybersecurity Analyst with a proven track
record of implementing and managing comprehensive security solutions to
Veer Surendra Sai University of Technology protect organizational assets in both on-premises and cloud environments.
Possesses in-depth expertise in endpoint security policy management,
IT | 7.37/10 | 2019 to 2023 vulnerability detection, network security, and cloud migration strategies.
Skilled in conducting vulnerability assessments, employing tools like Trend
Micro Vulnerability Scanner (TMVS) and advanced IP scanners to proactively
Higher Secondary School
identify and mitigate risks.
Newton College of +2 science Highly experienced in designing and enforcing security policies across email
Science | 81.83% | 2017 security, web security, proxy, and endpoint protection systems, ensuring
compliance with industry standards.
Demonstrates strong problem-solving capabilities in resolving complex IT
Class 10
infrastructure issues, including printers, scanners, and agent operations,
Sukha High School while optimizing organizational security tools for seamless performance.
89.33% | 2015 Well-versed in incident response, threat intelligence, and security
governance, with a strong foundation in advanced networking (CCNA-
CORE COMPETENCIES certified), routing, LAN switching, and network troubleshooting.
Successfully led cloud migration projects for security solutions, ensuring
Endpoint Security & Cloud Management robust protection and operational efficiency during transitions.
Vulnerability Detection & Threat A proactive and dedicated professional, consistently staying ahead of
Remediation emerging cyber threats and committed to implementing innovative security
Cloud Migration & Security Integration measures to safeguard critical systems.
Email Security Operation Known for exceptional analytical abilities, technical acumen, and a results-
Policy Management & Compliance driven approach to cybersecurity challenges, making an invaluable asset to
IT Infrastructure Support & Agent any organization seeking a top-tier cybersecurity expert.
Operations
WORK EXPERIENCE
Networking & Security Expertise
Proxy Web Security & Troubleshooting
Attack Surface Risk Management Cyber Security Analyst April 2024 to present
XDR Threat detection and Incident National Aluminium Company Limited
Response
Key Result Areas:
Security Logs Analysis and user
behaviour detection. Administered and optimized email security systems, including Trend
Micro Vision One Cloud Console and IMSVA appliances, to safeguard
ACHIEVEMENTS organizational communication.
Proactively configured and refined security policies to reduce false
Successfully led the migration of Trend positives and enhance threat detection accuracy.
Successfully identified and blocked phishing attacks, spoofed senders,
Micro Apex One agents to Cloud SaaS,
and malicious IPs by analyzing email headers and utilizing SPF, DKIM, and
resolving technical challenges and
DMARC protocols.
ensuring smooth integration with
Efficiently managed quarantined emails, reprocessed legitimate
external servers.
messages, and minimized disruptions to user communication.
Resolved issues related to notification formats and ensured proper
delivery of quarantine alerts to end-users.
Addressed issues like domain blacklisting, invalid addresses, and quota
Engineered a custom proxy setup within
limits to maintain smooth email delivery. managed IP reputation to
Apex One to enable agent communication
prevent delivery failures
with internal servers, bypassing client-
Resolved user complaints regarding quarantines, notifications, and email
side proxy constraints and ensuring
delivery, providing technical expertise and timely resolutions.
uninterrupted connectivity for security
Successfully led the migration of Trend Micro Apex One from on-premises
agents.
to SaaS console, ensuring minimal downtime and seamless transition.
Developed and implemented Implemented custom proxy configurations for agents to bypass client-
comprehensive endpoint and server side proxy dependencies, enabling successful communication with
security policies post-migration, internal and cloud servers.
significantly enhancing the organization's Optimized & implemented all the endpoints security policies (including
security posture and achieving a reduced servers) to align with organizational requirements and cloud best
ASRM risk index. practices.
Ensured seamless operations for all Reduced ASRM Risk Index from Medium to Low: Achieved a 15% reduction
endpoints with optimized security in risk index by implementing ASRM license, updating server policies,
measures, leveraging expertise to align endpoint application patches, and Windows OS versions, ensuring 25%
policies with organizational requirements. compliance across endpoints.
Implemented web filtering and proxy policies to ensure compliance and
Resolved Critical Quarantine and reduce security incidents.
Notification Issues. Proxy Server Administration for Configured and optimized forward proxy
Addressed blacklisting, resolved email servers to centralize and secure web traffic.
bounce issues (including domain errors, Managed structured processes for URL exceptions to balance security
storage limits, and invalid addresses), and with accessibility.
streamlined email routing to ensure Optimized proxy and DNS configurations for seamless and secure internet
secure and uninterrupted connectivity.
communication.
PROJECTS
Improved Policy Management.
Implemented SPF-Based Authentication
to Strengthened protection against TM Vision One Cloud SaaS Migration 4 Months
spoofing by utilizing SPF checks to Key Result Areas:
distinguish between legitimate users and
Successfully migrated endpoint security from an on-premises Apex One
external attackers.
setup to Trend Vision One Cloud SaaS console.
Overcame significant challenges related to proxy configurations, local
TECHNICAL SKILLS DNS, and agent-server communication by implementing custom proxy
settings on the Apex One console.
Streamlined migration for all endpoints, ensuring seamless registration
Endpoint Protection & Antivirus
with Trend Micro's cloud servers.
Management
Reduced downtime and security risks during the migration process by
Network Troubleshooting and Cloud resolving technical bottlenecks, such as IP exceptions and proxy
Migration dependency issues.
Web Security and Proxy Management Collaborated with Trend Micro's technical team, analyzed logs (Wireshark,
CDT, and debug logs), and developed a robust migration strategy.
Security Policy Management Enhanced endpoint security and scalability by transitioning to a cloud-
XDR Threat Detection and Incident based solution.
Response Skills : Cloud Migration , Troubleshooting , Proxy Configuration
Email and Collaboration Security
Endpoint Security Dashboard
Attack Surface Risk Management 2 months
Basic Excel (Vlookup, Index and formulas) Key Result Areas:
Power BI Developed an Advanced Endpoint Security Dashboard using Power BI.
Created interactive pages: Home, Overview, Action Required, and Risk
Detection.
SOFT SKILLS Displayed real-time endpoint security metrics, including unresolved
threats and agent installation status.
Analytical and Problem-Solving Skills Implemented dynamic filters (domain, year, month, day) for customized
data analysis.
Collaboration and Teamwork
Enabled drill-through analytics for in-depth investigation of high-risk
Adaptability and Fast Learning Ability endpoints.
Leadership Integrated tooltips for actionable remediation steps for virus, malware,
and spyware.
Attention to Detail Improved organizational risk management and security posture with
Time Management actionable insights.
Problem-Solving Enhanced organizational security posture by highlighting vulnerabilities
and remediation opportunities.
Skills : Data Analysis, Power BI, Threat Monitoring

You might also like