SlideShare a Scribd company logo
1 of 7
Name: Arunkumar Rai
Mobile:+91-8082664304/8655692984
Email:kumar.arun031@gmail.com
SUMMARY
Around 1.5 Years of experience in IT Security Operations. Involved in Implementation, Administration,
Configuration, Planning, Maintenance, Up gradation, rapid identification of problems and issues, provide fast
troubleshooting and problem resolution.
Work Profile
 In-depth experience in Operation as well as Governance related Project
 Proficient in managing SIEM, IDS, Vulnerability Assessment and Antivirus application in an Enterprise
environment
 Configured SIEM- Splunk Enterprise Security on Windows as well as on Unix envoirnment and
Vulnerability Assessment – Nessus manager.
 Possess in depth knowledge of security solutions and implementing security used cases for maintain the
security posture of customer environment.
 Have proven track record of providing Enterprise Level Support for a wide geographic area.
Capgemini India Pvt Ltd - Mumbai August 2015 – Till
Capgemini India Pvt Ltd - Mumbai August 2015 – Till
Capgemini Cyber security – Security Analyst
 SIEM – Splunk Enterprise Security: - The scope included creating rules and parsers for particular
signatures and events. Creating customized dashboards and Alarms. Integrating and Managing Data
Sources onto the Indexers. Integrated PaloAlto Traps(IDS) application with Splunk to get the logs
forwarded to the indexer
Tools Used: - Splunk, MacAfee Nitro Security
 Intrusion Detection System :- Worked in a 24x7 SOC environment, responsible for performing analysis
for notified threat activity and creating reports for security incidents detected by IDS solution. Created
variable set for different site Vlans and tagged them to appropriate Intrusion and Access Control Policy.
Performed routine health checks of IDS Defense Center and sensors. Played a vital role in up grade of IDS
environment. Automated the process of the alerts and daily reports notification directly on mail
Tool Used: - Sourcefire IDS, Palo Alto IDS
 Vulnerability Assessment and Management :- The scope included end to end setup Vulnerability
Assessment setup (Nessus Manager) for one of the largest electronic retailer firm. Implemented Nessus
manager and integrated 3 scanners with the manager. Performed monthly internal and external
vulnerability assessment and recommend corrective measures for remediation. Achieved to remediate all
the Critical and High vulnerability in multiple assigned project.
Tool Used: - Nessus
 Hardening/Baseline Compliance: - Was responsible to perform hardening scan across Windows and
Linux platforms for one of our client. Made custom changes in the audit files and selected hardening
controls based on the Infrastructure requirements. Provided scan reports for remediation to fix the failed
controls in the environment
Tool Used :- Nessus
 Governance Project:- Involved in governance project and was responsible to perform user account review
and user audit related activities.
Technical Skill Set
 Applications/Skill Set: Splunk, Sourcefire Defense Center,Palo Alto IDS , Nessus, Mcafee Nitro
Security , Vulnerability Management, Hardening Compliance.
 Ticketing Tools: BMC Remedy 8.1, Servicenow
 Operating Systems: Windows Server 2008 and 2012.
Educational Qualification
Year Degree University/Board Percentage
2015
B.E. Electronics & Mumbai 70%
Telecommunication University
(Aggregate of 8
Semester)
2010 - 2011 H.S.C C.B.S.E Board 57.20%
2008 - 2009 S.S.C C.B.S.E Board 68%
Strengths
 Leadership Quality.
 Good Team Player.
 Hardworking capability.
Personal Profile
Name : Arun Rai
Date of Birth : 5th
November 1993
Gender : Male
Language Spoken : English, Hindi, Marathi
Hobbies : Playing Cricket and Football
Martial Status : Single
Nationality : Indian
Permanent Address
: A-402, Mahesh Apartment, Plot no 23 A&B, Sector-5,
Ghansoli, Navi Mumbai, 400701.
I hereby declare that the information provided above is true to the best of my knowledge
Place: Mumbai
Date: Arunkumar Upendra Rai
Arun_Rai_Resume

More Related Content

What's hot

Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
AlienVault
 
Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud
Alert Logic
 
3 secure design principles
3   secure design principles3   secure design principles
3 secure design principles
drewz lin
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
Vicky Ames
 

What's hot (20)

Health information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information securityHealth information secuirty session 5 best practise in information security
Health information secuirty session 5 best practise in information security
 
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce RiskVulnerability Management: How to Think Like a Hacker to Reduce Risk
Vulnerability Management: How to Think Like a Hacker to Reduce Risk
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and ExploitsMeltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
 
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNETWHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to Basics
 
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
Simplifying IT Security for GDPR Compliance: Sharique M Rizvi
 
Vulnerability Management V0.1
Vulnerability Management V0.1Vulnerability Management V0.1
Vulnerability Management V0.1
 
Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
3 secure design principles
3   secure design principles3   secure design principles
3 secure design principles
 
Incident Response in the wake of Dear CEO
Incident Response in the wake of Dear CEOIncident Response in the wake of Dear CEO
Incident Response in the wake of Dear CEO
 
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MIS
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
Effective Vulnerability Management
Effective Vulnerability ManagementEffective Vulnerability Management
Effective Vulnerability Management
 

Similar to Arun_Rai_Resume

Resume-John-Whitney
Resume-John-WhitneyResume-John-Whitney
Resume-John-Whitney
John Whitney
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
aksit_services
 
Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1
Sivasankaran Krishnan
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resume
Albert Gonzales
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)
Abhishek Sa
 

Similar to Arun_Rai_Resume (20)

Resume-John-Whitney
Resume-John-WhitneyResume-John-Whitney
Resume-John-Whitney
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1Jenkins_ Carlasha 2016 v1
Jenkins_ Carlasha 2016 v1
 
Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1Sivasankaran_9yrs_Information_security V1
Sivasankaran_9yrs_Information_security V1
 
Albert G Info systems resume
Albert G Info systems resumeAlbert G Info systems resume
Albert G Info systems resume
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
tarunidhar
tarunidhartarunidhar
tarunidhar
 
Jump Start Your Application Security Knowledge
Jump Start Your Application Security KnowledgeJump Start Your Application Security Knowledge
Jump Start Your Application Security Knowledge
 
Saravanan_Resume_IBM Updated
Saravanan_Resume_IBM UpdatedSaravanan_Resume_IBM Updated
Saravanan_Resume_IBM Updated
 
Dinesh_Resume
Dinesh_ResumeDinesh_Resume
Dinesh_Resume
 
Abhishek-New (1)
Abhishek-New (1)Abhishek-New (1)
Abhishek-New (1)
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
SubramanianRIyer2016
SubramanianRIyer2016SubramanianRIyer2016
SubramanianRIyer2016
 
Best Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdfBest Practices to Secure Company's Legacy Applications in 2023.pdf
Best Practices to Secure Company's Legacy Applications in 2023.pdf
 
Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016Thomas reinheimer resume 04152016
Thomas reinheimer resume 04152016
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 

Arun_Rai_Resume

  • 1. Name: Arunkumar Rai Mobile:+91-8082664304/8655692984 Email:kumar.arun031@gmail.com SUMMARY Around 1.5 Years of experience in IT Security Operations. Involved in Implementation, Administration, Configuration, Planning, Maintenance, Up gradation, rapid identification of problems and issues, provide fast troubleshooting and problem resolution. Work Profile  In-depth experience in Operation as well as Governance related Project  Proficient in managing SIEM, IDS, Vulnerability Assessment and Antivirus application in an Enterprise environment  Configured SIEM- Splunk Enterprise Security on Windows as well as on Unix envoirnment and Vulnerability Assessment – Nessus manager.
  • 2.  Possess in depth knowledge of security solutions and implementing security used cases for maintain the security posture of customer environment.  Have proven track record of providing Enterprise Level Support for a wide geographic area.
  • 3. Capgemini India Pvt Ltd - Mumbai August 2015 – Till
  • 4. Capgemini India Pvt Ltd - Mumbai August 2015 – Till
  • 5. Capgemini Cyber security – Security Analyst  SIEM – Splunk Enterprise Security: - The scope included creating rules and parsers for particular signatures and events. Creating customized dashboards and Alarms. Integrating and Managing Data Sources onto the Indexers. Integrated PaloAlto Traps(IDS) application with Splunk to get the logs forwarded to the indexer Tools Used: - Splunk, MacAfee Nitro Security  Intrusion Detection System :- Worked in a 24x7 SOC environment, responsible for performing analysis for notified threat activity and creating reports for security incidents detected by IDS solution. Created variable set for different site Vlans and tagged them to appropriate Intrusion and Access Control Policy. Performed routine health checks of IDS Defense Center and sensors. Played a vital role in up grade of IDS environment. Automated the process of the alerts and daily reports notification directly on mail Tool Used: - Sourcefire IDS, Palo Alto IDS  Vulnerability Assessment and Management :- The scope included end to end setup Vulnerability Assessment setup (Nessus Manager) for one of the largest electronic retailer firm. Implemented Nessus manager and integrated 3 scanners with the manager. Performed monthly internal and external vulnerability assessment and recommend corrective measures for remediation. Achieved to remediate all the Critical and High vulnerability in multiple assigned project. Tool Used: - Nessus  Hardening/Baseline Compliance: - Was responsible to perform hardening scan across Windows and Linux platforms for one of our client. Made custom changes in the audit files and selected hardening controls based on the Infrastructure requirements. Provided scan reports for remediation to fix the failed controls in the environment Tool Used :- Nessus  Governance Project:- Involved in governance project and was responsible to perform user account review and user audit related activities. Technical Skill Set  Applications/Skill Set: Splunk, Sourcefire Defense Center,Palo Alto IDS , Nessus, Mcafee Nitro Security , Vulnerability Management, Hardening Compliance.  Ticketing Tools: BMC Remedy 8.1, Servicenow  Operating Systems: Windows Server 2008 and 2012.
  • 6. Educational Qualification Year Degree University/Board Percentage 2015 B.E. Electronics & Mumbai 70% Telecommunication University (Aggregate of 8 Semester) 2010 - 2011 H.S.C C.B.S.E Board 57.20% 2008 - 2009 S.S.C C.B.S.E Board 68% Strengths  Leadership Quality.  Good Team Player.  Hardworking capability. Personal Profile Name : Arun Rai Date of Birth : 5th November 1993 Gender : Male Language Spoken : English, Hindi, Marathi Hobbies : Playing Cricket and Football Martial Status : Single Nationality : Indian Permanent Address : A-402, Mahesh Apartment, Plot no 23 A&B, Sector-5, Ghansoli, Navi Mumbai, 400701. I hereby declare that the information provided above is true to the best of my knowledge Place: Mumbai Date: Arunkumar Upendra Rai