ABDULBASIT RAZA
· Cybersecurity Consultant ·
Abdulbasit Raza is looking to utilize his skills and knowledge acquired through school and work in a challenging Information Technology environment. His experience as a developer and tester serves as a strong background for his Cybersecurity experience which he is developing further in Cognizant. He plans to continue developing his skills so that he may be the strongest asset for his future employer. His experience and skills make him a great candidate for your Cybersecurity Consultant position.
SKILLS/TECHNOLOGIES
• JAVA, Spring Boot, RESTful, HTML5, SQL, Angular 7, GITHUB, Spring MVC, CSS3, JavaScript, MongoDB, BootStrap, Angular, SoapUI, PostMan, Swagger, Splunk, Qradar, CyberArk, Symantic, CrowdStrike, Qualys
EXPERIENCE AND PROJECTS
CYBERSECURITY IVM/ITM, COGNIZANT
NOVEMBER 2021 TO PRESENT
•Learned NIST Cybersecurity Framework
•Respectable knowledge in Network Fundamentals
•Hands on experience in identifying phishing emails
•Used individually assigned Ubuntu Virtual Machines to:
•Practice Linux skills
•Demonstrate network fundamentals
•Capture and study events from log files
•Host Apache2 Web Server
•Host Splunk Universal Forwarder with live connection to Splunk Server
•Splunk Core Fundamentals through hands on practice and Splunk training Topics:
oSplunk Architecture
oSearches
oReporting
oVisualizations
oDashboards
oSplunk REST API
oStrong understanding of the differences between SIEM and UEBA
oStrong understanding of File Integrity Monitoring via Splunk
•Developed Splunk Correlation to identify and address emerging security threats with continuous monitoring, alerting, and analytic
•Analyzed security based events, risks and reporting instances.
•Monitored Database connection health
•Worked on installing Universal Forwarder and heavy forwarders to bring any kind of data fields.
•Qualys Vulnerability Management Certified Specialist Training Topics Covered:
oVulnerability Management Detection & Response
oVulnerability Management
oScanning Strategies & Best Practices
oReporting Strategies & Best Practices
oQualys API Fundamentals
oPerform Vulnerability scanning and identifying the root cause of vulnerabilities
oProvided remediation on accounts deemed to be a vulnerability risk
•Strong understanding of Crowdstrike Endpoint Detection Fundamentals
•Web & Programming including:
oHTML5, CSS, AJAX, JavaScript, Java Basics, JSON
•Sailpoint Test Analyst
•Strong understanding of internal technicalities Sailpoint
•Experienced in End-to-End integration of IAM using Sailpoint
•Ready to work on IAM products, To learn and Deliver the best
•CyberArk Privileged Access Management
•Great Understanding of CyberArk infrastructure
•Experience in IAM Tools for deployment
•Hands on experience in using the Password vault Web Access, Enterprise Password Vault, Central Policy Manager
•Experience in PAM operational tasks – Defining access control, user entitlement, credentials, user Policy management
•Observe Security Solutions: SIEMs, Firewall appliances, IDS, DLP systems, analysis tools.
•Technical analysis of Network activity
•Monitor and evaluate network Flow
PROJECT
•Use the student Ubuntu VM Web Server to create a dynamically generated web page from the Splunk REST API, which automates display of cybersecurity related data.
•Cyber Threat Defense
oProactively monitoring, investigating, and mitigation of security incidents
oAnalyze security event data from network via IBM Qradar
oConduct log analysis using IBM Qradar
oUse tools such as Anomoli to do further investigation on the source IP address
oEnsure the integrity and protection of networks, systems, and applications by technical enforcement of organizational policies
SOC Analyst(Cognizant), Freddie Mac
October 2023 TO May 2024
•Worked in a 24x7 Security Operations Center
•Continuous monitoring and interpretation of threats using IDS and SIEM
•Conducted Proactive Monitoring, investigation, and mitigation of security incidents
•Collaborated with Security engineers and SOC managers to provide Situational Awareness via detection, containment, and remediation of threats to networks, web apps, and systems
•Identify suspicious/malicious activities or codes
•Performed static malware analysis on isolated virtual servers.
•Searched Firewall, email, web or DNS logs to identify and mitigate intrusion attempts
•Conducted Log analysis on Splunk.
•Hands on experience with Symantec for DLP related scenarios
•Conduct investigation on domains and Ips using open-source tools such as URL Scan and Virus Total
•Used AWS, Crowdstrike, Symantec, and Proofpoint to verify/manage security assessments and pinpoint Flaws
•Recognize Potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analysis of relevant event detail and summary information. Examples of attacks I have recognized:
oPhishing
oPort Scanning
oWeb app attacks
oDDOS
•Conducted QA analysis on other SOC engineers analysis to ensure they were meeting the Freddie Mac standard
oScored based system on how well written the analysis was and if enough evidence was included to support their analysis
oIf they failed the analyst had to go back and correct their mistake
SOC Analyst(Cognizant), Discover Financial Services
NOVEMBER 2022 TO APRIL 2023
•Worked in a 24x7 Security Operations Center
•Continuous monitoring and interpretation of threats using IDS and SIEM
•Identify suspicious/malicious activities or codes
•Investigate Phishing email using Demisto Tool
•Conduct investigation on domains and Ips using open-source tools such as URL Scan and Virus Total
oAs Well as used LastLine for Full URL Link and document analysis
oConduct analysis on potential Phishing emails by creating a ticket in Resiliant
•Conduct Log analysis using SIEM tools such as Splunk
•Conducted PCAP analysis using WireShark
•Search firewall, email, web or DNS logs to identify and mitigate intrusion attempts.
•Analyze network flow data for anomalies and detect malicious network activities
•Ensure searches for Indicators of Compromise are completed when reported, through EDR tools
•Hands on experience with Symantec for DLP related scenarios
•Recognize Potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analysis of relevant event detail and summary information. Examples of attacks I have recognized:
oPhishing
oPort Scanning
oWeb app attacks
oDDOS
FULL STACK DEVELOPER, COLLABERA
AUGUST 2019 TO DECEMBER 2020
•Built Several Java projects ranging from simple programs to Spring Boot applications
•Assisted in others to create a Database in MySQL
•Collaborated with others to create a website using HTML5 and other technologies to make improvements
QUALITY ASSURANCE/TESTER, WELLS FARGO (THROUGH COLLABERA_
JANUARTY 2020 TO AUGUST 2020
•Created several Test Scripts to test the software upgrades
•Utilized Software such as ALM and Jira to test the software and find defects
•Executed Test scripts against software to ensure it met the requirements
EDUCATION
BACHELOR OF SCIENCE · Computer Network and Security · Wilmington University, 2019