Post Job Free
Sign in

Information Technology Cybersecurity Consultant

Location:
Sayreville, NJ, 08859
Salary:
85,000
Posted:
July 10, 2024

Contact this candidate

Resume:

ABDULBASIT RAZA

· Cybersecurity Consultant ·

Abdulbasit Raza is looking to utilize his skills and knowledge acquired through school and work in a challenging Information Technology environment. His experience as a developer and tester serves as a strong background for his Cybersecurity experience which he is developing further in Cognizant. He plans to continue developing his skills so that he may be the strongest asset for his future employer. His experience and skills make him a great candidate for your Cybersecurity Consultant position.

SKILLS/TECHNOLOGIES

• JAVA, Spring Boot, RESTful, HTML5, SQL, Angular 7, GITHUB, Spring MVC, CSS3, JavaScript, MongoDB, BootStrap, Angular, SoapUI, PostMan, Swagger, Splunk, Qradar, CyberArk, Symantic, CrowdStrike, Qualys

EXPERIENCE AND PROJECTS

CYBERSECURITY IVM/ITM, COGNIZANT

NOVEMBER 2021 TO PRESENT

•Learned NIST Cybersecurity Framework

•Respectable knowledge in Network Fundamentals

•Hands on experience in identifying phishing emails

•Used individually assigned Ubuntu Virtual Machines to:

•Practice Linux skills

•Demonstrate network fundamentals

•Capture and study events from log files

•Host Apache2 Web Server

•Host Splunk Universal Forwarder with live connection to Splunk Server

•Splunk Core Fundamentals through hands on practice and Splunk training Topics:

oSplunk Architecture

oSearches

oReporting

oVisualizations

oDashboards

oSplunk REST API

oStrong understanding of the differences between SIEM and UEBA

oStrong understanding of File Integrity Monitoring via Splunk

•Developed Splunk Correlation to identify and address emerging security threats with continuous monitoring, alerting, and analytic

•Analyzed security based events, risks and reporting instances.

•Monitored Database connection health

•Worked on installing Universal Forwarder and heavy forwarders to bring any kind of data fields.

•Qualys Vulnerability Management Certified Specialist Training Topics Covered:

oVulnerability Management Detection & Response

oVulnerability Management

oScanning Strategies & Best Practices

oReporting Strategies & Best Practices

oQualys API Fundamentals

oPerform Vulnerability scanning and identifying the root cause of vulnerabilities

oProvided remediation on accounts deemed to be a vulnerability risk

•Strong understanding of Crowdstrike Endpoint Detection Fundamentals

•Web & Programming including:

oHTML5, CSS, AJAX, JavaScript, Java Basics, JSON

•Sailpoint Test Analyst

•Strong understanding of internal technicalities Sailpoint

•Experienced in End-to-End integration of IAM using Sailpoint

•Ready to work on IAM products, To learn and Deliver the best

•CyberArk Privileged Access Management

•Great Understanding of CyberArk infrastructure

•Experience in IAM Tools for deployment

•Hands on experience in using the Password vault Web Access, Enterprise Password Vault, Central Policy Manager

•Experience in PAM operational tasks – Defining access control, user entitlement, credentials, user Policy management

•Observe Security Solutions: SIEMs, Firewall appliances, IDS, DLP systems, analysis tools.

•Technical analysis of Network activity

•Monitor and evaluate network Flow

PROJECT

•Use the student Ubuntu VM Web Server to create a dynamically generated web page from the Splunk REST API, which automates display of cybersecurity related data.

•Cyber Threat Defense

oProactively monitoring, investigating, and mitigation of security incidents

oAnalyze security event data from network via IBM Qradar

oConduct log analysis using IBM Qradar

oUse tools such as Anomoli to do further investigation on the source IP address

oEnsure the integrity and protection of networks, systems, and applications by technical enforcement of organizational policies

SOC Analyst(Cognizant), Freddie Mac

October 2023 TO May 2024

•Worked in a 24x7 Security Operations Center

•Continuous monitoring and interpretation of threats using IDS and SIEM

•Conducted Proactive Monitoring, investigation, and mitigation of security incidents

•Collaborated with Security engineers and SOC managers to provide Situational Awareness via detection, containment, and remediation of threats to networks, web apps, and systems

•Identify suspicious/malicious activities or codes

•Performed static malware analysis on isolated virtual servers.

•Searched Firewall, email, web or DNS logs to identify and mitigate intrusion attempts

•Conducted Log analysis on Splunk.

•Hands on experience with Symantec for DLP related scenarios

•Conduct investigation on domains and Ips using open-source tools such as URL Scan and Virus Total

•Used AWS, Crowdstrike, Symantec, and Proofpoint to verify/manage security assessments and pinpoint Flaws

•Recognize Potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analysis of relevant event detail and summary information. Examples of attacks I have recognized:

oPhishing

oPort Scanning

oWeb app attacks

oDDOS

•Conducted QA analysis on other SOC engineers analysis to ensure they were meeting the Freddie Mac standard

oScored based system on how well written the analysis was and if enough evidence was included to support their analysis

oIf they failed the analyst had to go back and correct their mistake

SOC Analyst(Cognizant), Discover Financial Services

NOVEMBER 2022 TO APRIL 2023

•Worked in a 24x7 Security Operations Center

•Continuous monitoring and interpretation of threats using IDS and SIEM

•Identify suspicious/malicious activities or codes

•Investigate Phishing email using Demisto Tool

•Conduct investigation on domains and Ips using open-source tools such as URL Scan and Virus Total

oAs Well as used LastLine for Full URL Link and document analysis

oConduct analysis on potential Phishing emails by creating a ticket in Resiliant

•Conduct Log analysis using SIEM tools such as Splunk

•Conducted PCAP analysis using WireShark

•Search firewall, email, web or DNS logs to identify and mitigate intrusion attempts.

•Analyze network flow data for anomalies and detect malicious network activities

•Ensure searches for Indicators of Compromise are completed when reported, through EDR tools

•Hands on experience with Symantec for DLP related scenarios

•Recognize Potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analysis of relevant event detail and summary information. Examples of attacks I have recognized:

oPhishing

oPort Scanning

oWeb app attacks

oDDOS

FULL STACK DEVELOPER, COLLABERA

AUGUST 2019 TO DECEMBER 2020

•Built Several Java projects ranging from simple programs to Spring Boot applications

•Assisted in others to create a Database in MySQL

•Collaborated with others to create a website using HTML5 and other technologies to make improvements

QUALITY ASSURANCE/TESTER, WELLS FARGO (THROUGH COLLABERA_

JANUARTY 2020 TO AUGUST 2020

•Created several Test Scripts to test the software upgrades

•Utilized Software such as ALM and Jira to test the software and find defects

•Executed Test scripts against software to ensure it met the requirements

EDUCATION

BACHELOR OF SCIENCE · Computer Network and Security · Wilmington University, 2019



Contact this candidate