Exclusive FY 2023-24 Year End Offer - upto 40% off | Hurry up - Offer valid till 31st March 2024
OnBenchMark Logo

Sumedh (RID : 19gk1l7efiv7r)

designation   Cloud Security Analyst

location   Location : Bangalore

experience   Experience : 1 Year

rate   Rate: $15 / Hourly

Availability   Availability : Immediate

Work From   Work From : Any

designation   Category : Information Technology & Services

Shortlisted : 2
Total Views : 69
Key Skills
Cloud Services Microsoft Security Wireshark Metasploit, Cain and Abel NMAP. Cyber Forensic - Autopsy Volatility FTK Imager Magnet Ram Capture
Discription

Professional Summary

I have been working in Cloudthat as a security consultant role specializing in cloud, 

Tech enthusiast in blockchain cybersecurity, cloud security, ethical hacking, and digital forensics.

Education 

BCA In Information Security. 

Sandip University Nashik, Maharashtra

MCA In Information Security & Management Services. 

Jain University Bengaluru, Karnataka

Technologies

• Microsoft Security

• Cybersecurity

• Digital Forensics

• Blockchain 

Technical Skills

 Cloud Services: Microsoft Security

• Microsoft identity and access management solutions 

• The concepts of security, compliance, and identity

• Microsoft Security solutions 

• Microsoft compliance solutions 

• Azure architecture and services

• Azure management and governance

• Implement platform protection

• Manage security operations 

• Secure data and applications 

• Implementing and managing an information protection 

• Implementing identities in Azure AD 

• Network and Infrastructure Security, Data governance, risk, and compliance

Technology Certifications

• Certified Ethical Hacker V10.

• SC900 Microsoft Certified Security Compliance and Identity Fundamentals.

• AZ900 Microsoft Certified Azure Fundamentals.

• CompTIA Security + SY0501.

• Splunk Infrastructure Overview.

Projects: CloudThat Technologies

An Observant of Records with Splunk for Information and Security Occurrence

• The activity of transforming fresh log particular into facts for issue solutions is recognized as 

tally analysis Security experts could use data acquisition for improving the security of their data 

centers.

• Marketing teams may use records to learn more about company consumer purchases plus user 

activity.

Security Tools 

• Ethical Hacking - Wireshark, Metasploit, Cain and Abel, NMAP.

• Splunk Enterprise - Log Analysis.

• Cyber Forensic - Autopsy, Volatility, FTK Imager, Magnet Ram Capture

Copyright© Cosette Network Private Limited All Rights Reserved
Submit Query
WhatsApp Icon
Loading…

stuff goes in here!