- Identified cyber threats through malware analysis, browser security improvements, system safeguards, and GRC
- Reduced cyber threats by 30% and enhanced digital asset resilience by reviewing Chrome and remote access analytics
- Cut security incident resolution time by 70% and minimized damages with an automated incident response detection
- Decreased fraudulent activities up to 60% by utilizing advanced analytical skills and timely identifying and preventing
C
CYBER FORENSIC AND INVESTIGATION
Security Engineer
Mumbai, IN-MH, IN
January 2019 - January 2020
P
Protection
Youth Cybersecurity Ambassador Trainer
Mumbai, IN-MH, IN
October 2017 - October 2018
Skills
Languages
EnglishHindiMarathiSanskrit
Skills
Ability to MultitaskAlgorithmsAmazon Web ServicesAnalytical ThinkingAnomaly DetectionApple Mac SystemsAutomationBurp SuiteCascading Style Sheets (CSS)CentOSCloud ComputingCloud Computing SecurityCommunication SkillsCompTIA A+CompTIA Network+CompTIA Security+Computer ForensicsComputer SecurityComputer VisionCoordination SkillsC++ (Programming Language)CryptographyCybercrimeData AnalysisDatabase AdministrationData ProtectionDigital AssetsDjango Web FrameworkEthical HackingFlask (Web Framework)Forensic SciencesFraud Prevention and DetectionGovernance Risk Management and ComplianceHTMLIdentity and Access ManagementImage ProcessingIncident ManagementIncident ResponseInformation TechnologyInfrastructure ManagementInnovationIntrusion Detection SystemsJava (Programming Language)JavaScript (Programming Language)JQueryKibanaKnowledge of CampaignsKnowledge of EngineeringKnowledge of PatentsLaw EnforcementLinuxMalwareMetasploitMicrosoft AccessMicrosoft AzureMicrosoft SQL ServerMicrosoft WindowsMongoDBMulti-Factor AuthenticationMySQLNessusNetwork ProtocolsNetwork SecurityNmapNode.JsObjective-C (Programming Language)Offensive Security Certified ProfessionalOpenSSLOperational SystemsOracle ApplicationsPerl (Programming Language)PerseverancePostgreSQLProblem SolvingProgram OptimizationPython (Programming Language)Random ForestReactJSRed Hat Enterprise LinuxRemote Access TechnologyResearch SkillsRisk AnalysisRisk ReductionRuby on RailsSafety PrinciplesSecurity AuditsSecurity Information and Event ManagementSecurity PoliciesSecurity SystemsSelf MotivationShell ScriptSnort (Software)Software DebuggingSplunkStrategic ThinkingSuccess Driven PersonSupply Chain ManagementSystem SafetySystems EngineeringTeam WorkingTerraformThreat ModelingUbuntu (Operating System)VulnerabilityWiresharkWorkflows