Badges
90 Points
8 Years
User Activity
Over 2 years ago
Contributed a review of CrowdStrike Falcon: Good lateral movement and overwatch detections but requires improvements in the Mac environment
Over 6 years ago
Contributed a review of ArcSight Analytics: It has improved our system and network policy monitoring
About 7 years ago
Contributed a review of Symantec Advanced Threat Protection: Real-time threat analysis is quick, takes action immediately
Over 7 years ago
Contributed a review of Barracuda Email Security Gateway: We have evaluated more than eight products of known vendors, and out of eight, we decided on this one.
Over 7 years ago
Answered a question: F5 vs. Imperva WAF?
In order to achieve the core objective of a WAF (Web Application Firewall) definitely you are focusing on the External Facing application, for external facing application IMPERVA INCAPSULA has a high ratio of payload collector which identify and capture the payload entered…
About 8 years ago
Contributed a review of Imperva DDoS: I like the content monitoring feature which I haven't seen in other WAF solutions.
About 8 years ago
Answered a question: Prolexic vs. Arbor Networks: How do they compare?
There are two aspects for this query
1) if the client has multiple applications that needs to be considered for DDos protection I will prefer to go with Prolexic, but
2) if the client has multiple network devices and those devices are front facing for being a security…
Projects
Over 2 years ago
The Auditor - Computer-Assisted Audit toolAn Audit tool, a one window solution for (Windows based operating system)
Platform: Visual C# 2013
It is a computer-assisted audit tool specifically designed for the Cybersecurity Professionals, Auditors, Advisors, and Consultants who are conducting audits for different…
Reviews
Over 2 years ago
CrowdStrike Falcon
About 7 years ago
Symantec Advanced Threat Protection
Over 7 years ago
Barracuda Email Security Gateway
About 8 years ago
Imperva DDoS
Answers
About 8 years ago
Distributed Denial-of-Service (DDoS) Protection
About me
Expertise in securely designing, integrating, and implementing security architecture of Web Based Applications, Database Applications and Client/Server Applications. Expertise in identifying vulnerabilities in the current system, assess threat landscape of the organization, conducting security review of servers including (Exchange Server, Domain Controller, Share Point, SAP, Office 365 and cloud-based application security review).
Involved in Reviewing, Deploying, Integrating and or recommending various solutions/technologies for the key areas of information security as mentioned below which includes but not limited to:
• Vulnerability Assessment & Penetration Testing.
• Data Leakage Prevention & Endpoint Security.
• Mobile Device Management.
• Network Stress & Load Testing.
• Cyber Drills.
• Compromise Assessment.
• SOC Maturity Assessment & Customization.
• Wireless Network & Frequencies Assessment.
• Security Assessment of TMS & AML based systems.
• Security review of Telecommunication Systems (Alcatel, Motorola, Huawei).
• Malware analysis & Threat Assessment.
• Network Architecture review.
• Cyber Investigation & Incident response.
• Social Engineering. and
• ICT/OT Environment Assessment.
Vulnerability Assessment & Penetration testing:
Nessus, Metasploit Professional, Nexpose, Acunetix, Open VAS, OWSAP ZAP, IronWASP, IBM App Scan, Web Cruiser, Core Impact, SAINT, Exploit Pack, Sparta.
Data Leakage Protection:
Symantec, Microsoft 365 E3.
Mobile Device Management Solution:
Air Watch, Maas360, Mobile Iron.
Security Information and Event Management:
QRADAR, Alien Vault, Splunk, LogRythm, OSSIM, ArcSight.
Intrusion Detection & Prevention System:
Snort, OSSEC, Tripwire, Suricata.
Incident Detection & Response Platforms:
EDR (Crowd Strike, Carbon Black, FireEye), XDR (McAfee, Trend Micro) and ATR.
Content Protection & Monitoring:
DarkOwl, Webroot, Breach directory, Spy Cloud.
Programming Languages:
Microsoft Visual C#, j#. NET, Turbo C++, C# Asp. Net, Assembly (basic), Python, Perl, Java RMI.
Networking Skills:
Active Directory, Exchange Server 2019, Simulation on (GNS 3, Packet Tracer, Boson Netsim) Inter V-LAN Routing, Deployment and customization of different Routing protocols and WAN Protocols in Professional Environment.
• Network Design & Implementation.
• Network Infrastructure Assessment.
• Network Deployment.
• Networks Optimization.
• Network Security. and
• Network Customization.
Web/Scripting Languages:
HTML, JavaScript (Basic), Xml, Bash Scripting, Shell Scripting, Java Scripting.
Cloud Computing Storage:
Open Stack, Nexenta, LXC.
Virtualization:
ESXI Servers, VM-Ware, Virtual Box, VDI Solution.
Databases:
NoSQL, MySQL, SQL Server, MongoDB, Sybase, S4 HANA.
Server Operating Systems:
Linux (Fedora, Radhat, SUSE, CentOS), Windows (Server 2012, 2016).
Information Security Awareness:
Knowbe4, PhishRod, ProofPoint.
OT/IOT Network:
Nozomi Guardian, Infoblox, Honeywell, NGWF 100F, 200F, Cyber vision, Triconex, Yokogava.
Forensic Technology Services
Meticulous understanding of Digital forensic investigation processes including Chain of custody, evidence collection, evidence analysis.
Comprehensive understanding of provisions of information technology act relating to Cybercrimes and Digital Forensic. Specialties in conducting Digital Forensic related investigation based upon the international standard of ISO/IEC 27037. Extensive hands-on experience on the following digital forensic tools including but not limited to:
• Encase Examiner.
• DT Search.
• Dr. Fone for Android & iOS.
• Enigma Recovery.
• Autopsy.
• Cellebrite
• Oxygen Forensic.
• Magnet Axiom.
• Nuix.
• Sleuthkit.
• DFIRTraige.
• Access data FTK imager.
• Digital evidence and forensics toolkit, SANS (SIFT), CAINE.
Interesting Projects and Accomplishments
Over 2 years ago