Professional Documents
Culture Documents
Gourav Experience Resume
Gourav Experience Resume
Brief Profile
Work experience with Aliz Infotech Pvt. Ltd. as Security Analyst for 1.6 year.Technical knowledge and
hands on experience with QRADAR, escalation and case handling in Manage Engine and Incident
Response review.
Experience of working in operations of SOC team, offering log monitoring, security information
management, global threat monitoring, anti-phishing, anti-malware, SPAM mails.
CORE COMPETENCIES
➢ Sound knowledge into Security Operations centre services, Incident Response, Threat Analysis &
Vulnerability Assessment.
➢ Strong communication skills both written and verbal.
➢ Excellent problem solving and root cause identification skills.
➢ Strong analytical and decision-making abilities.
➢ Well-versed with OWASP Top Ten and MITRE framework
➢ Fundamental on Malware analysis.
➢ Basic Knowledge in DLP, encryption, HIDS, NIDS and firewall technology familiar with PROXY, DLP, AV,
WAF and VPN
➢ Good experience in Linux and Windows server.
EMPLOYMENT RECORD
• Monitoring of security events of critical systems (e.g. e-mail servers, database Servers, web servers,
Active Directory etc.) and changes to highly sensitive computer security Controls to ensure appropriate
system administrative actions, investigate and report on noted irregularities with the help of IBM
QRadar.
• Manage & Reporting of SIEM and Security Device Health Status on regular interval to the relevant
stakeholders.
• SOC level1 investigation and follow-up of escalated threats/events/incidents
• As Security Analyst work on creating new trouble on Manage Engine for alerts that signal an
incident and Escalate ticket Tier2/Incident Response review.
• Analysis of the latest alerts to determine relevancy and urgency
• Creating case in Manage Engine & preparing notification which is to be sent to technical teams for
action onincidents
• Working on Phishing/malicious email reported by user on security mailbox.
• Monitoring of offenses and do the initial analysis to check the True positive and False positive.
• As per the Escalation matrix performing incident follow-ups towards closure and ensuring suitable
corrective action initiated against the severity of the incident and to maintain the SLA.
• Document and track the status of enquiries, coordinate appropriate responses and follow-up to ensure
customer satisfaction.
• Take a note of number of incident open in all teams & update from previous shift.
• Daily and monthly trend analysis on security incidents.
Technical Skills
Network & Security Tools • SIEM, TCP/IP, OSI layer, IP addressing, Trend Micro,
QRADAR, Manage Engine and Qualys
CERTIFICATIONS
Personal Profile
Disclaimer: I hereby declare that all the statement made by me are true and correct to the best of my
knowledge and belief.