Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Dheeraj Paul Lella

763-910-2693
lellad@csp.edu

SUMMARY OF QUALIFICATIONS:

● 6.5 years of IT Experience with design, development, implementation and troubleshooting Network &
Security infrastructure.
● Working experience with Qualys, Tenable, Tanium, Nessus, or Rapid7.
● Experienced in security assessment, documentation of compliance, implementation of controls.
● Experience with common information security management frameworks, such as ISO 2700X NIST, PCI and
HIPPA.
● Excellent understanding and knowledge of Identity and Access Management (IAM) and Role Based Access
Control (RBAC)
● Excellent understanding of Governance, Risk and Compliance.
● Responsible for applying the latest Symantec standards on various platforms (Windows, UNIX, Middleware,
AIX, etc.) through the Symantec control compliance suite tool.
● Provide onsite Symantec DLP technical service and support to a Large Enterprise customer base.
● Expert in Implementing & Managing Symantec tools like Data Loss Prevention (DLP) and Secure Web
Gateway.
● Highly skilled in Splunk to build, configure and maintain different environments and in-depth knowledge of
log analysis generated by various operating systems.
● Experience in Penetration Testing using manual/automatic tools.
● Possess experience working with Netezza, SQL, oracle databases.
● Reviewed and analyzed requirements for assets and identities, ensuring a comprehensive understanding of
data sources.
● Conducted onboarding and normalization of identified data, optimizing its structure for effective
utilization.
● Implemented robust data validation processes to guarantee the viability and accuracy of acquired data.
● Executed specific implementations of assets and identities for Enterprise Security using diverse sources,
including Splunk SA-LDAP search.
● Leveraged Splunk UF ADMON for configuring and managing Universal Forwarders, ensuring optimal log
data monitoring and forwarding.
● Applied expertise in handling customer-provided CSV files, executing data extraction, transformation, and
loading (ETL) processes.
● Provided robust visibility and control over cloud service usage, ensuring secure data transfer.
● Implemented and managed effective security policies for data protection, compliance, and real-time
analytics within CASB.
● Adapted CASB to support diverse deployment models based on organizational requirements.
● Achieved significant benefits, including enhanced visibility, data loss prevention, and compliance
enforcement, effectively mitigating unauthorized access risks in the cloud.
● Ensured seamless integration of varied data sources to enhance overall Enterprise Security infrastructure.
● Involved in working with L2-L4 network services by enabling virtual applications of load balancing, WAN
acceleration and virtual security appliances.
● In-depth knowledge and proven expert proficiency in designing, engineering, configuring, and maintaining
of large enterprise firewalls.
● Advanced knowledge, design, installation, configuration, maintenance and administration of Checkpoint
Advanced Knowledge in IPSEC VPN design connection and protocols, IPSEC tunnel configuration,
encryption and integrity protocols
● Knowledge of Server Maintenance, including establishing Security Protocols, Configuring Network, and
Troubleshooting Problems.
● Expertise in running, developing, and enhancing enterprise vulnerability management programs.
● Conduct organization-wide vulnerability scanning and oversee remediation processes across diverse lines
of business.
● Proficient in administering vulnerability management solutions, including Qualys, Rapid7 InsightVM,
Nessus, Kenna Security, Crowdstrike, and open source tools.
● Ensure device configurations align with organizational security standards, managing vendor pentests for
comprehensive security assessments.
● Lead and mature enterprise vulnerability management programs, configuring, troubleshooting, and
administering solutions.
● Develop executive-level metrics and KPIs to measure the effectiveness of vulnerability programs.
● Hold security certifications such as CISSP, GIAC, or other industry-recognized certifications.
● Possess knowledge of cyber security frameworks like NIST, ISO, or CIS, coupled with effective
communication skills.

Education Details:
Course Board / University Year Marks Obtained

Masters Concordia University, St. Paul, Minnesota 2023 3.8 CGPA

B.Sc. Loyola Academy Degree and PG college 2015 65%

Intermediate Standard Junior college 2012 80%

SSC Vijaya Mary High School 2010 75%

Technical Skills:
Networking Network Traffic Analysis (NTA), Endpoint detection and response, IDS/IPS,
Technologies Security Operation Center, Forensic analysis
Networking Hardware Cisco Switches, Cisco Routers, ASA/Pix/Palo Alto/Fortinet/Juniper firewalls.
Forensic Technologies Encase, FTK Imager, Autopsy, Kali
Security Technologies PAP, CHAP, Cisco PIX, Blue Coat, Palo Alto, ASA, Fortinet, Checkpoint
Security Tools QualysGuard, Metasploit, Nessus, Threat connects, Tenable, Nikto, Burp Suite,
Alien Vault, Splunk, Qradar, Rapid 7, Proof point.
Network Monitoring Solar winds, Wireshark, HRping, NsLookup, TCP Dump, Infoblox, SPLUNK
Operating Systems Windows 7, KALI LINUX, Parrot Sec
Capacity & performance Cascade Riverbed (Flow Monitor), WAN Killer
Simulation Tools GNS3, VMware, OPNET IT GURU, OPNET Modeler, Cadence
Firewalls Juniper Net Screen (500/5200), Juniper SRX (650/3600), Pix (525/535), ASA
(5520/5550/5580), McAfee Web Gateway, Checkpoint, Palo Alto firewalls,
Trend micro-Antivirus.
AAA Architecture TACACS+, RADIUS, Cisco ACS

Professional Experience:
Company Name : Mindtree L&T Limited, Hyd.
Client: Microsoft, USA Nov2021 to May
2022
Role: Cyber Security Engineer

Responsibilities:
● Experience with host and network log sources to apply to investigation, IR methodology in investigations,
and the groups behind targeted attacks and tactics, techniques, and procedures (TTPs)
● Knowledge of common network and host security technologies and appliances.
● Processes both internal and external Cyber Threat Intelligence for determination of impact, hunting to
determine scope, and implementation of mitigations to defend client enterprise.
● Conduct trending and correlation of cyber intelligence for the purposes of attribution and establish
strategic countermeasures to increase defenses, including customized signatures, in-house identified
indicators of compromise and behaviors associated with targeted behavior, with support from the Threat
Monitoring team.
● Collecting and analyzing author threat intelligence reports covering new threats, vulnerabilities, products,
and research.
● Execute vulnerability scanning and remediation processes as a proficient vulnerability analyst.
● Utilize expertise in administering comprehensive vulnerability management solutions: Qualys, Rapid7
InsightVM, Nessus, Kenna Security, Crowdstrike, and open source tools.
● Demonstrate in-depth knowledge of cybersecurity frameworks, including NIST, ISO, and CIS, ensuring
alignment with industry standards.
● Hold esteemed security certifications such as CISSP, GIAC, and other industry-recognized certifications.
● Leverage effective communication skills to articulate complex vulnerabilities and risk mitigation strategies.
● Collaborate with cross-functional teams to assess and assure device configurations against organizational
security standards.
● Manage and lead vendor pentests, overseeing security assessments and ensuring comprehensive threat
coverage.
● Contribute to the development and enhancement of enterprise vulnerability management programs.
● Create executive-level metrics and key performance indicators (KPIs) to measure and communicate
program effectiveness.Process indicators of compromise and threat actor TTPs for correlation, detection
and alerting in appropriate security tools.
● Assist in the migration of endpoint solution from McAfee to Crowdstrike.
● Assist in creating streamlined processes and procedures that enables events to quickly and accurately be
classified, prioritized, and escalated appropriately when necessary.
● Assist windows team in pushing Access controls as per the NIST framework by using Microsoft GPO.
● Assist team in addition to GPO for policy implementation and troubleshooting for all supported security
controls.
● Work with McAfee SIEM [NSM] to find out causes for triggered alerts. Monitor IDS and other alerts by using
SIEM.
● Share timely intelligence and insights with internal and external stake holders to enhance situational
awareness of the global threat landscape.
● Participate in change management meetings and review change tickets to determine security controls.
● Monitors all information security related systems intended to provide incident reporting or predictive
analysis of the systems.
● Documenting process to identify gaps and provide process enhancement recommendations.
● Lead role in all security and privacy compliance efforts. Compliance includes NIST, PCI, CIS and IRS PUB-10.
● Assisting with the development, documentation, and implementation of IRS safeguards process to ensure
all controls are compatible with IRS guidelines.
● Install, configure, and administer information security technologies intended to protect assets from
internal and external threats.
● Managing frequent, ad hoc request from the agencies for IBM app-scan and Nessus scans.

Company Name: TCS(TATA Consultancy Services), Hyderabad. Aug 2021 to Nov


2021.
Client: TCS, Hyderabad, India.
Role : Sr. IT / Information Security Analyst
Responsibilities:
● Responsible for working with multiple systems and data domains to enable operational efficiencies, risk
detection and prevention through policy rule development and optimization and associated
operationalization of response capabilities.
● Responsible for design and implementation of security requirements, standards and reference
architectures for incorporation into corporate policies and technical standards.
● Conducted vulnerability testing using tools such as Nessus and Qualys Guard.
● Automated centralized detection of security vulnerabilities with scripts for vulnerability assessment tools
like Qualys Guard and Splunk Phantom.
● Performed discovery and vulnerability scans using Qualys and analyzed/prioritized findings.
● Administered vulnerability management assessment scans for remote networks using Qualys.
● Worked on PCI and ISO compliant security implementations on firewalls and perimeter devices.
● Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
● Conducted security assessments and accreditations for existing systems in the SDLC.
● Managed vendor pentests, overseeing security assessments and ensuring comprehensive threat coverage.
● Configured and administered vulnerability management solutions, including Qualys, Rapid7 InsightVM,
Nessus, Kenna Security, Crowdstrike, and open source tools.
● Executed specific implementations of assets and identities for Enterprise Security using Splunk SA-LDAP
search, Splunk UF ADMON, and customer-provided CSV files.
● Created executive-level vulnerability management metrics and key performance indicators (KPIs) to
measure program effectiveness.Experience in Qualys policy compliance in detecting internal and external
Threats and vulnerability.
● Responsible for internal Qualys WAS services and White Hat Security scans.
● Automated the centralized detection of security vulnerabilities with scripts for Vulnerability assessment
tools like Qualys guard and Splunk phantom.
● Performed vulnerability testing using tools such as Nessus and Qualys guard.
● Conducted discovery and vulnerability scans using Qualys and analyzed/prioritized the findings to how it
impacts the environment.
● Conducted periodic scans and on demand scans as and when new network devices are introduced, or
configurations are updated in the windows servers with QualysGuard.
● Conduct network and endpoint discovery mapping and administer vulnerability management assessment
scans for remote networks using Qualys.
● Perform troubleshooting by packet capture analysis using TCP Dump, Wireshark and analyzing the PCAP.
● PCI and ISO compliant security implementations on the firewalls and perimeter devices.
● Experience using Nessus & Qualys Tool for networking discovery and mapping, asset prioritization,
vulnerability assessment and tracking.
● Bluecoat proxy server’s setup, configuration, upgrade and troubleshooting with optimization of WAN
Application, SSL traffic, Web traffic, URL filtering & Content filtering.
● Experience in working with designing, installing and troubleshooting Palo Alto firewalls.
● Configuring Checkpoint and ASA for NAT (Static PAT/Manual NAT) to enable remote access for sites by
doing Port redirection and configuring various VPNs like IPsec Site to Site, SSL VPN.
● Create policies, alerts and configure using SIEM tools (Splunk, Solar Winds, LogRhythm).
● Installation of Palo Alto (Web Application and URL filtering, Threat Prevention, Data Filtering).
Implemented Zone Based Firewalling and Security Rules on the Palo Alto Firewall.
● Worked on network packet analyzer tools such as, Wireshark, Nslookup, Microsoft Network Monitor, Snort,
Tcpdump, SSL Dump etc.
● Migration from Cisco to Palo Alto firewall & Cisco to Checkpoint firewall.
● Experience with working on Palo Alto Next-Generation firewalls security profiles and Cisco ASA VPN.
● Experience on working with migration with both Checkpoint and Palo Alto Next-Generation.
● Worked on security tools and softwares like Cisco WSA, Qualys, Splunk, Symantec Endpoint Protection,
Bit9, HP Network Node Management.
● Exposure to wildfire advances malware detection using the IPS feature of Palo Alto.
● Worked on bluecoat proxy to optimize WAN Performance by analyzing and scanning malwares to protect
the infrastructure and URL filtering.
● Organized all the Security Assessment and Accreditation for existing systems in the SDLC.
● Good Hands-on experience in various spring framework modules like spring boot, spring AOP, spring
security, spring cloud, spring data, spring batch, Spring IOC, spring Transaction management
● Routing and Switch protocols: BGP, OSFP, VLAN, VTP, STP, RIP, RSTP.
● Firewall deployment, rules migrations, firewall administration and converting existing rule based onto
new Checkpoint and Palo Alto Next-Generation Firewall platforms.

Company Name: Infosys Limited, Hyderabad, India. Mar 2019 to May


2021.
Client: Western Union Money Transfer, USA.
Role: Sr. Security Engineer
Responsibilities:
● Responsible for working with multiple systems and data domains to enable operational efficiencies, risk
detection and prevention through policy rule development and optimization and associated
operationalization of response capabilities.
● Responsible for design and implementation of security requirements, standards and reference
architectures for incorporation into corporate policies and technical standards.
● Convert business and functional requirements into technical security policies, configurations, determine
security capability gaps/overlaps and opportunities for improvements.
● Monitor, document, and resolve assigned cybersecurity related tickets, SIEM alerts, operational inquiries,
and other system alerts.
● Maintained cybersecurity asset inventory and ensured cybersecurity related protections are fully deployed
and healthy, and all necessary security patches are applied.
● Assist with security operations necessary to maintain the confidentiality, availability, and integrity of
enterprise data and information systems.
● Assist in maintenance of security tools and technologies throughout the enterprise environment.
● Assist with monitor and respond to daily SIEM alerts.
● Maintaining, reviewing and updating Information Security System documentation, to include but not
limited to System Security Plan (SSP), Plan of Action & Milestone, Risk Assessment, policies and
procedures, security control baselines in accordance with NIST guidelines and security practices and CSI
goals and objectives.
● Conduct IT controls risk assessment to identify system threats, vulnerabilities and risk, and generate
reports.
● SIEM monitoring and security event analysis for all critical servers and applications utilizing customized
Splunk queries, network traffic analysis, and Symantec Endpoint Manager.
● Highly skilled in Splunk to build, configure and maintain different environments and in-depth knowledge of
log analysis generated by various operating systems.
● Scripted SQL Queries in accordance with the Splunk.
● Conduct IT controls risk assessment to identify system threats, vulnerabilities, and risks, and generate
reports.
● Performed Qualys/CVE remediation duties, including firmware and port security.
● Responsible for internal Qualys WAS services and White Hat Security scans.
● Automated the centralized detection of security vulnerabilities with scripts for Vulnerability assessment
tools like Qualys guard and Splunk phantom.
● Performed vulnerability testing using tools such as Nessus and Qualys guard.
● Conducted discovery and vulnerability scans using Qualys and analyzed/prioritized the findings.
● PCI and ISO compliant security implementations on the firewalls and perimeter devices.
● Experience using Nessus & Qualys Tool for networking discovery and mapping, asset prioritization,
vulnerability assessment, and tracking.
● Conduct network and endpoint discovery mapping and administer vulnerability management assessment
scans for remote networks using Qualys.
● Exposure to wildfire advances malware detection using the IPS feature of Palo Alto.
● Organized all the Security Assessment and Accreditation for existing systems in the SDLC.

Company Name: Wipro Technologies, Hyderabad, India. NOV 2015 to MAR 2019.
Client: Nokia Seimens Network.
Role : Security Analyst
Responsibilities:
● Maintaining, reviewing, and updating Information Security System documentation, to include but not
limited to System Security Plan (SSP), Plan of Action & Milestone, Risk Assessment, policies and
procedures, security control baselines in accordance with NIST guidelines and security practices.
● Provide technical evaluation and analysis. Supports activities, processes, and tools needed to improve the
overall security posture of the organization.
● Apply security concepts, review information, execute defined tasks, analyze requirements, review logs, and
create documentation.
● Perform investigation and data loss prevention, data manipulation, and coordination of activities.
● Perform actions to address or mitigate risks and vulnerabilities. Review and define controls.
● Advise on more complex security procedures and products for teams, security administrators and network
operations.
● Participate in enforcement of control security risks and threats; potential of one more control subject to
manager discretion. Share knowledge with staff.
● Conduct security assessments and other information security routines consistently.
● Investigate and recommend corrective actions for data security related to established guidelines.
● Maintain advanced knowledge of information security technologies; always expanding scope of knowledge.
● Perform various assurance and auditing activities to ensure that IT Security controls can protect enterprise
data assets.
● Develop procedures intended to sustain the security of the company’s data and access to its technology and
communications systems.
● Ensure the distribution and communication of these procedures in appropriate systems and media.
● Enable the design and operation of related compliance monitoring and improvement activities to ensure
compliance both with internal security policies etc. and applicable laws and regulations. Develop a means
of continuous monitoring.
● Establish suitable information security awareness, training, and educational activities.

You might also like