Professional Documents
Culture Documents
Dheeraj Paul - CyberSecurity - 1
Dheeraj Paul - CyberSecurity - 1
763-910-2693
lellad@csp.edu
SUMMARY OF QUALIFICATIONS:
● 6.5 years of IT Experience with design, development, implementation and troubleshooting Network &
Security infrastructure.
● Working experience with Qualys, Tenable, Tanium, Nessus, or Rapid7.
● Experienced in security assessment, documentation of compliance, implementation of controls.
● Experience with common information security management frameworks, such as ISO 2700X NIST, PCI and
HIPPA.
● Excellent understanding and knowledge of Identity and Access Management (IAM) and Role Based Access
Control (RBAC)
● Excellent understanding of Governance, Risk and Compliance.
● Responsible for applying the latest Symantec standards on various platforms (Windows, UNIX, Middleware,
AIX, etc.) through the Symantec control compliance suite tool.
● Provide onsite Symantec DLP technical service and support to a Large Enterprise customer base.
● Expert in Implementing & Managing Symantec tools like Data Loss Prevention (DLP) and Secure Web
Gateway.
● Highly skilled in Splunk to build, configure and maintain different environments and in-depth knowledge of
log analysis generated by various operating systems.
● Experience in Penetration Testing using manual/automatic tools.
● Possess experience working with Netezza, SQL, oracle databases.
● Reviewed and analyzed requirements for assets and identities, ensuring a comprehensive understanding of
data sources.
● Conducted onboarding and normalization of identified data, optimizing its structure for effective
utilization.
● Implemented robust data validation processes to guarantee the viability and accuracy of acquired data.
● Executed specific implementations of assets and identities for Enterprise Security using diverse sources,
including Splunk SA-LDAP search.
● Leveraged Splunk UF ADMON for configuring and managing Universal Forwarders, ensuring optimal log
data monitoring and forwarding.
● Applied expertise in handling customer-provided CSV files, executing data extraction, transformation, and
loading (ETL) processes.
● Provided robust visibility and control over cloud service usage, ensuring secure data transfer.
● Implemented and managed effective security policies for data protection, compliance, and real-time
analytics within CASB.
● Adapted CASB to support diverse deployment models based on organizational requirements.
● Achieved significant benefits, including enhanced visibility, data loss prevention, and compliance
enforcement, effectively mitigating unauthorized access risks in the cloud.
● Ensured seamless integration of varied data sources to enhance overall Enterprise Security infrastructure.
● Involved in working with L2-L4 network services by enabling virtual applications of load balancing, WAN
acceleration and virtual security appliances.
● In-depth knowledge and proven expert proficiency in designing, engineering, configuring, and maintaining
of large enterprise firewalls.
● Advanced knowledge, design, installation, configuration, maintenance and administration of Checkpoint
Advanced Knowledge in IPSEC VPN design connection and protocols, IPSEC tunnel configuration,
encryption and integrity protocols
● Knowledge of Server Maintenance, including establishing Security Protocols, Configuring Network, and
Troubleshooting Problems.
● Expertise in running, developing, and enhancing enterprise vulnerability management programs.
● Conduct organization-wide vulnerability scanning and oversee remediation processes across diverse lines
of business.
● Proficient in administering vulnerability management solutions, including Qualys, Rapid7 InsightVM,
Nessus, Kenna Security, Crowdstrike, and open source tools.
● Ensure device configurations align with organizational security standards, managing vendor pentests for
comprehensive security assessments.
● Lead and mature enterprise vulnerability management programs, configuring, troubleshooting, and
administering solutions.
● Develop executive-level metrics and KPIs to measure the effectiveness of vulnerability programs.
● Hold security certifications such as CISSP, GIAC, or other industry-recognized certifications.
● Possess knowledge of cyber security frameworks like NIST, ISO, or CIS, coupled with effective
communication skills.
Education Details:
Course Board / University Year Marks Obtained
Technical Skills:
Networking Network Traffic Analysis (NTA), Endpoint detection and response, IDS/IPS,
Technologies Security Operation Center, Forensic analysis
Networking Hardware Cisco Switches, Cisco Routers, ASA/Pix/Palo Alto/Fortinet/Juniper firewalls.
Forensic Technologies Encase, FTK Imager, Autopsy, Kali
Security Technologies PAP, CHAP, Cisco PIX, Blue Coat, Palo Alto, ASA, Fortinet, Checkpoint
Security Tools QualysGuard, Metasploit, Nessus, Threat connects, Tenable, Nikto, Burp Suite,
Alien Vault, Splunk, Qradar, Rapid 7, Proof point.
Network Monitoring Solar winds, Wireshark, HRping, NsLookup, TCP Dump, Infoblox, SPLUNK
Operating Systems Windows 7, KALI LINUX, Parrot Sec
Capacity & performance Cascade Riverbed (Flow Monitor), WAN Killer
Simulation Tools GNS3, VMware, OPNET IT GURU, OPNET Modeler, Cadence
Firewalls Juniper Net Screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA
(5520/5550/5580), McAfee Web Gateway, Checkpoint, Palo Alto firewalls,
Trend micro-Antivirus.
AAA Architecture TACACS+, RADIUS, Cisco ACS
Professional Experience:
Company Name : Mindtree L&T Limited, Hyd.
Client: Microsoft, USA Nov2021 to May
2022
Role: Cyber Security Engineer
Responsibilities:
● Experience with host and network log sources to apply to investigation, IR methodology in investigations,
and the groups behind targeted attacks and tactics, techniques, and procedures (TTPs)
● Knowledge of common network and host security technologies and appliances.
● Processes both internal and external Cyber Threat Intelligence for determination of impact, hunting to
determine scope, and implementation of mitigations to defend client enterprise.
● Conduct trending and correlation of cyber intelligence for the purposes of attribution and establish
strategic countermeasures to increase defenses, including customized signatures, in-house identified
indicators of compromise and behaviors associated with targeted behavior, with support from the Threat
Monitoring team.
● Collecting and analyzing author threat intelligence reports covering new threats, vulnerabilities, products,
and research.
● Execute vulnerability scanning and remediation processes as a proficient vulnerability analyst.
● Utilize expertise in administering comprehensive vulnerability management solutions: Qualys, Rapid7
InsightVM, Nessus, Kenna Security, Crowdstrike, and open source tools.
● Demonstrate in-depth knowledge of cybersecurity frameworks, including NIST, ISO, and CIS, ensuring
alignment with industry standards.
● Hold esteemed security certifications such as CISSP, GIAC, and other industry-recognized certifications.
● Leverage effective communication skills to articulate complex vulnerabilities and risk mitigation strategies.
● Collaborate with cross-functional teams to assess and assure device configurations against organizational
security standards.
● Manage and lead vendor pentests, overseeing security assessments and ensuring comprehensive threat
coverage.
● Contribute to the development and enhancement of enterprise vulnerability management programs.
● Create executive-level metrics and key performance indicators (KPIs) to measure and communicate
program effectiveness.Process indicators of compromise and threat actor TTPs for correlation, detection
and alerting in appropriate security tools.
● Assist in the migration of endpoint solution from McAfee to Crowdstrike.
● Assist in creating streamlined processes and procedures that enables events to quickly and accurately be
classified, prioritized, and escalated appropriately when necessary.
● Assist windows team in pushing Access controls as per the NIST framework by using Microsoft GPO.
● Assist team in addition to GPO for policy implementation and troubleshooting for all supported security
controls.
● Work with McAfee SIEM [NSM] to find out causes for triggered alerts. Monitor IDS and other alerts by using
SIEM.
● Share timely intelligence and insights with internal and external stake holders to enhance situational
awareness of the global threat landscape.
● Participate in change management meetings and review change tickets to determine security controls.
● Monitors all information security related systems intended to provide incident reporting or predictive
analysis of the systems.
● Documenting process to identify gaps and provide process enhancement recommendations.
● Lead role in all security and privacy compliance efforts. Compliance includes NIST, PCI, CIS and IRS PUB-10.
● Assisting with the development, documentation, and implementation of IRS safeguards process to ensure
all controls are compatible with IRS guidelines.
● Install, configure, and administer information security technologies intended to protect assets from
internal and external threats.
● Managing frequent, ad hoc request from the agencies for IBM app-scan and Nessus scans.
Company Name: Wipro Technologies, Hyderabad, India. NOV 2015 to MAR 2019.
Client: Nokia Seimens Network.
Role : Security Analyst
Responsibilities:
● Maintaining, reviewing, and updating Information Security System documentation, to include but not
limited to System Security Plan (SSP), Plan of Action & Milestone, Risk Assessment, policies and
procedures, security control baselines in accordance with NIST guidelines and security practices.
● Provide technical evaluation and analysis. Supports activities, processes, and tools needed to improve the
overall security posture of the organization.
● Apply security concepts, review information, execute defined tasks, analyze requirements, review logs, and
create documentation.
● Perform investigation and data loss prevention, data manipulation, and coordination of activities.
● Perform actions to address or mitigate risks and vulnerabilities. Review and define controls.
● Advise on more complex security procedures and products for teams, security administrators and network
operations.
● Participate in enforcement of control security risks and threats; potential of one more control subject to
manager discretion. Share knowledge with staff.
● Conduct security assessments and other information security routines consistently.
● Investigate and recommend corrective actions for data security related to established guidelines.
● Maintain advanced knowledge of information security technologies; always expanding scope of knowledge.
● Perform various assurance and auditing activities to ensure that IT Security controls can protect enterprise
data assets.
● Develop procedures intended to sustain the security of the company’s data and access to its technology and
communications systems.
● Ensure the distribution and communication of these procedures in appropriate systems and media.
● Enable the design and operation of related compliance monitoring and improvement activities to ensure
compliance both with internal security policies etc. and applicable laws and regulations. Develop a means
of continuous monitoring.
● Establish suitable information security awareness, training, and educational activities.