CakeResume Talent Search

Advanced filters
On
4-6 years
6-10 years
10-15 years
More than 15 years
Avatar of chen chopper.
Avatar of chen chopper.
助理工程師 @行政法人國家資通安全研究院
2023 ~ Present
滲透測試、資訊安全、系統開發、程式設計
Within one month
陳燕葶 Chopper Chen 來自台南,個性活潑樂觀富創造力,樂於學習新知及勇於接受新的挑戰。西元2018年畢業於國防大學理工學院資訊工程學系,於國防部服務4年後,目前於財團法人國家實驗研究院服務,主要工作經歷包含程式開發、滲透測試、惡意程式
python語言
C
Assembly Language
Employed
Open to opportunities
Full-time / Interested in working remotely
4-6 years
國立臺北科技大學NTUT
自動化工程研究所
Avatar of Monisha Prasad.
Offline
Avatar of Monisha Prasad.
Offline
Past
Cyber Security Analyst | SOC Analyst @Wipro Technologies
2019 ~ 2023
Cyber Security Engineer
Within six months
Security, Endpoint Security, Network security and Vulnerability assessment. Seeking a challenging role as Cybersecurity Engineer to utilize and enhance my skills and expertise. Technical Skills Network concept:- OSI model, TCP/IP protocols. Concepts:- CIA, AAA, Hashing, Encryption, MFA, Threat, Vulnerability and Risk, Handshake. Knowledge on Malwares:- Viruses, Worms, Trojan horse, Botnet, Adware, Spyware, Rootkit, Ransomware, Key logger, Logical bombs, Malware analysis, Cyber kill chain & Mitre Att&ck Framework. Good understanding on phase of attack and type of attack:- Brute force attack, DoS attack, DDoS attack, XSS, SQL injection, Phishing attack. Tools Exposer SIEM
SIEM Solutions
Endpoint Security and EDR
WAF Technologies
Unemployed
Full-time / Interested in working remotely
4-6 years
Birla Institute of Technology and Science, Pilani
Information Technology
Avatar of the user.
Avatar of the user.
Past
Security Engineer @Gorilla Technology Group
2018 ~ 2023
Cyber Security Engineer
Within three months
Linux
Windows
Incident Response
Unemployed
Full-time / Interested in working remotely
4-6 years
銘傳大學 Ming Chuan University
Computer Science
Avatar of the user.
Avatar of the user.
Senior Researcher @TXOne Networks, inc.
2021 ~ Present
Security Researcher
More than one year
C++
C
Assembly Language
Employed
Full-time / Interested in working remotely
6-10 years
National Taiwan University of Science and Technology
Computer Science
Avatar of the user.
Avatar of the user.
Jay Sawyer Glenview Digital Marketing @Jay Sawyer Web Design Company
2010 ~ Present
Web Designer
More than one year
web designer
web design
marketing
Employed
Part-time / Interested in working remotely
4-6 years
University of Chicago
Web Designer
Avatar of Rolando Yang.
Avatar of Rolando Yang.
Past
Senior C++ QT Developer @Tood, Michael and James, Inc.
2019 ~ 2020
Senior Software Engineer
More than one year
., Senior C++ QT Developer, Mar 2019 ~ Jul 2020 ✔️ Used QT 5.14 to develop audio & video editor called AudioSurgeon and VideoSurgeon. ✔️ Implemented source modifications and custom development processes. ✔️ Developed and implemented GUI applications and library frameworks. ✔️ Created user interfaces, Malware bytes and Anti-Malware products. ✔️ Participated in design and peer reviews with other developers. ✔️ Prepared quality software applications with agile based technologies. ✔️ Supported designing and implementation of robust code for modularity. ✔️ Executed GUI applications and business logic of RTT and DeltaGen
Qt
Qt Creator
Visual C++
Unemployed
Full-time / Remote Only
6-10 years
University of Phoenix

The Most Lightweight and Effective Recruiting Plan

Search resumes and take the initiative to contact job applicants for higher recruiting efficiency. The Choice of Hundreds of Companies.

  • Browse all search results
  • Unlimited access to start new conversations
  • Resumes accessible for only paid companies
  • View users’ email address & phone numbers
Search Tips
1
Search a precise keyword combination
senior backend php
If the number of the search result is not enough, you can remove the less important keywords
2
Use quotes to search for an exact phrase
"business development"
3
Use the minus sign to eliminate results containing certain words
UI designer -UX
Only public resumes are available with the free plan.
Upgrade to an advanced plan to view all search results including tens of thousands of resumes exclusive on CakeResume.

Definition of Reputation Credits

Technical Skills
Specialized knowledge and expertise within the profession (e.g. familiar with SEO and use of related tools).
Problem-Solving
Ability to identify, analyze, and prepare solutions to problems.
Adaptability
Ability to navigate unexpected situations; and keep up with shifting priorities, projects, clients, and technology.
Communication
Ability to convey information effectively and is willing to give and receive feedback.
Time Management
Ability to prioritize tasks based on importance; and have them completed within the assigned timeline.
Teamwork
Ability to work cooperatively, communicate effectively, and anticipate each other's demands, resulting in coordinated collective action.
Leadership
Ability to coach, guide, and inspire a team to achieve a shared goal or outcome effectively.
Within six months
Cybersecurity Engineer | SOC Analyst | Email Security | SIEM | EDR | WAF | Threat Hunter
Logo of Wipro Technologies.
Wipro Technologies
2019 ~ 2023
Bengaluru, Karnataka, India
Professional Background
Current status
Unemployed
Job Search Progress
Professions
Security Engineer
Fields of Employment
Work experience
4-6 years
Management
Skills
SIEM Solutions
Endpoint Security and EDR
WAF Technologies
Email Security
ITSM Tools
Languages
English
Professional
Kannada
Native or Bilingual
Hindi
Fluent
Job search preferences
Positions
Cyber Security Engineer
Job types
Full-time
Locations
Remote
Interested in working remotely
Freelance
Educations
School
Birla Institute of Technology and Science, Pilani
Major
Information Technology
Print

 

Monisha Prasad

Cybersecurity Engineer | SOC Analyst

  Bengaluru, Karnataka, India
  +91-9620710507
  [email protected]
linkedin.com/in/-monishaprasad/

PROFESSIONAL SUMMARY
Experienced cybersecurity professional with over 5+ years of experience in the field, including 4+ years as a Cyber Security Engineer at Wipro Technologies and 1+ years in Incident Management. Proficient in Security tools and Incident Response. Skilled in SIEM solutions, Email Security, Endpoint Security, Network security and Vulnerability assessment. Seeking a challenging role as Cybersecurity Engineer to utilize and enhance my skills and expertise.

Technical Skills

Network concept:- OSI model, TCP/IP protocols.

Concepts:- CIA, AAA, Hashing, Encryption, MFA, Threat, Vulnerability and Risk, Handshake.

Knowledge on Malwares:- Viruses, Worms, Trojan horse, Botnet, Adware, Spyware, Rootkit, Ransomware, Key logger, Logical bombs, Malware analysis, Cyber kill chain & Mitre Att&ck Framework.

Good understanding on phase of attack and type of attack:- Brute force attack, DoS attack, DDoS attack, XSS, SQL injection, Phishing attack.

Tools Exposer

SIEM Solutions:                                                 Endpoint Security and EDR:

•    Splunk                                                              •    Sentinel one

•    Fire Helix                                                         •    Crowd strike EDR

•    Securonix                                                        •    Microsoft Defender for Endpoints

WAF Technologies:                                              ITSM Tools:

•    Imperva                                                           •    Service now

•    Cloudflare                                                       •    Digital Hub

Email Security:

•    Proofpoint Email Protection

         •    TAP (Targeted Attack Protection)

         •    TRAP (Threat Response Auto Pull)

         •    Enterprise Firewall

         •    Digital Risk & Compliance

•    Fire EYE ETP

•    PhishER


Certifications

➢ Microsoft Azure AZ900

➢ Splunk fundamentals and administration

➢ Certified Network Security Expert NSE1 & NSE2

Professional Experience

Cyber Security Analyst | SOC Analyst  •  Wipro Technologies

September 2017 - October 2023

• Proactively identify and mitigate cyber threats through log analysis, investigation, and comprehensive remediation strategies.
• Implementing advanced Security Policies, Firewall rules and Custom rules in email gateways to minimize risks from phishing and malicious emails with respect to the Change management process.
• Also working on alerts such as Imposter, Attachment, URL defense. Quarantining the malicious emails.
• To maintain Digital Risk & Compliance, constantly monitor and discover the Look-alike domain and block it post examining.
• Conduct thorough vulnerability assessments and generate detailed reports for improved information security.
• Created and enhanced SOP documents with the essential updates and prepared multiple reports as per the project requirement and presenting it on the weekly/monthly meetings.
• Work on non-compliant endpoints to maintain compliance and adhere to internal controls operations and procedure.
• Provide swift incident response, continuous security monitoring and robust incident management to safeguard critical assets.
• Effectively isolate and remediate compromised endpoints using EDR tools and system reimaging.
•Stay up to date with the latest attack trends, IOCs, and TTPs, sharing crucial insights with the team.
• Thrive in high-pressure SOC operational environments, ensuring seamless coordination and communication.

Education

Birla Institute of Technology and Science, Pilani

Master of Technology 

2018 - 2021

Personal Dossier 


DOB: 12 August 1996

Languages


English, Kannada, Hindi

Resume
Profile

 

Monisha Prasad

Cybersecurity Engineer | SOC Analyst

  Bengaluru, Karnataka, India
  +91-9620710507
  [email protected]
linkedin.com/in/-monishaprasad/

PROFESSIONAL SUMMARY
Experienced cybersecurity professional with over 5+ years of experience in the field, including 4+ years as a Cyber Security Engineer at Wipro Technologies and 1+ years in Incident Management. Proficient in Security tools and Incident Response. Skilled in SIEM solutions, Email Security, Endpoint Security, Network security and Vulnerability assessment. Seeking a challenging role as Cybersecurity Engineer to utilize and enhance my skills and expertise.

Technical Skills

Network concept:- OSI model, TCP/IP protocols.

Concepts:- CIA, AAA, Hashing, Encryption, MFA, Threat, Vulnerability and Risk, Handshake.

Knowledge on Malwares:- Viruses, Worms, Trojan horse, Botnet, Adware, Spyware, Rootkit, Ransomware, Key logger, Logical bombs, Malware analysis, Cyber kill chain & Mitre Att&ck Framework.

Good understanding on phase of attack and type of attack:- Brute force attack, DoS attack, DDoS attack, XSS, SQL injection, Phishing attack.

Tools Exposer

SIEM Solutions:                                                 Endpoint Security and EDR:

•    Splunk                                                              •    Sentinel one

•    Fire Helix                                                         •    Crowd strike EDR

•    Securonix                                                        •    Microsoft Defender for Endpoints

WAF Technologies:                                              ITSM Tools:

•    Imperva                                                           •    Service now

•    Cloudflare                                                       •    Digital Hub

Email Security:

•    Proofpoint Email Protection

         •    TAP (Targeted Attack Protection)

         •    TRAP (Threat Response Auto Pull)

         •    Enterprise Firewall

         •    Digital Risk & Compliance

•    Fire EYE ETP

•    PhishER


Certifications

➢ Microsoft Azure AZ900

➢ Splunk fundamentals and administration

➢ Certified Network Security Expert NSE1 & NSE2

Professional Experience

Cyber Security Analyst | SOC Analyst  •  Wipro Technologies

September 2017 - October 2023

• Proactively identify and mitigate cyber threats through log analysis, investigation, and comprehensive remediation strategies.
• Implementing advanced Security Policies, Firewall rules and Custom rules in email gateways to minimize risks from phishing and malicious emails with respect to the Change management process.
• Also working on alerts such as Imposter, Attachment, URL defense. Quarantining the malicious emails.
• To maintain Digital Risk & Compliance, constantly monitor and discover the Look-alike domain and block it post examining.
• Conduct thorough vulnerability assessments and generate detailed reports for improved information security.
• Created and enhanced SOP documents with the essential updates and prepared multiple reports as per the project requirement and presenting it on the weekly/monthly meetings.
• Work on non-compliant endpoints to maintain compliance and adhere to internal controls operations and procedure.
• Provide swift incident response, continuous security monitoring and robust incident management to safeguard critical assets.
• Effectively isolate and remediate compromised endpoints using EDR tools and system reimaging.
•Stay up to date with the latest attack trends, IOCs, and TTPs, sharing crucial insights with the team.
• Thrive in high-pressure SOC operational environments, ensuring seamless coordination and communication.

Education

Birla Institute of Technology and Science, Pilani

Master of Technology 

2018 - 2021

Personal Dossier 


DOB: 12 August 1996

Languages


English, Kannada, Hindi