One head with different hats! Internet Enthusiast & an Avid Traveler
Life So Far |
SIEM Systems, QRadar, Root Cause Analysis, Lead/manage cyber-security incidents (Viz. Malware/ Ransomware attacks, Social Engineering, Phishing, AUP violation etc.)
EnCase Enterprise, Internet Evidence Finder (IEF), Axiom by Magnet Forensic, FTK Imager, Tableau TD2, Tableau Forensic Bridge, Masster Solo IV
Threat Intelligence Feeds, Open IOC, IOC Extraction/Management, Pro-active Threat Hunting
In-depth forensic analysis of exhibits, Evidence Seizing, Maintaining Chain of Custody, Reporting, Case Management
Crime Scene Reporting, Training, Knowledge Base Management
WordPress, Magento, Joomla
Cognizant Technology Solutions, Chennai
Regional Forensic Science Laboratory, Pune
Scientific Assistant (Cyber Crime)
November 2016 to February 2018
Null Object Interactive Pvt. Ltd
Tendul Tech Labs
A list of my recent studies and developments
Case Study: Forensic Analysis of Private/ Incognito Mode Browsing in Modern Browsers using IEF
With increasing use of modern browsers and it's private browsing capabilities, it has become a challenge for forensic investigators to trace the evidences. This case study involves forensic analysis of private mode browsing in modern browsers Google Chrome, Mozilla Firefox and Internet Explorer using Internet Evidence Finder. (Uploading the report in my upcoming blog post.)
Malware Sample Submission Portal
In diverse organizations having security teams working across locations, it is vital to ensure secure handling malware samples between teams for analysis, IOC extraction etc.
Developed a Proof-of-Concept (PoC) for centralized malware sample submission portal to avoid mishandling of malware samples by various teams in organization.
Threat Intelligence Portal
Thousands of news and articles about the latest trends in cyber security are published every single day and as a cyber security professional it’s impossible to keep your tabs open all the time.
I developed a RSS Feeds aggregation platform providing cyber security team regularly updated web content by gathering it in one place for easy reading. Instead of constantly checking multiple news sites, blogs, podcasts and other sources throughout the day, analysts can just access this portal which will automatically keep itself updated with the latest developments as they happen.
This not only helped in proactive threat hunting but also helped team in
staying a step ahead of potential cyber-security incidents.
Case Study: Forensic Analysis of Private/ Incognito Mode Browsing in Modern Browsers using Axiom
With increasing use of modern browsers and it's private browsing capabilities, it has become a challenge for forensic investigators to trace the evidences. This case study involves forensic analysis of private mode browsing in modern browsers Google Chrome, Mozilla Firefox and Internet Explorer using Axiom Tool by Magnet Forensic. (Uploading the report in my upcoming blog post.)