This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "User:Masterpiece"

From OWASP
Jump to: navigation, search
m (Creating user page for new user.)
 
 
Line 1: Line 1:
Jigar Lad is currently pursuing my M.Tech in Cyber Security and Incident Response under the Gujarat Forensic Sciences University with the
+
As an Information Security Professional, I have good knowledge in understanding the architecture, design, management and controls that assures the security of business environments and incident handling through log analysis. Identifying the root causes of security incidents and collecting useful data for compliance reporting.
current GPA 8.00.
 
  
My area of interest are Web Application Pen-Testing, Network Security, Vulnerability Management and Business Continuity Planning. My skill set includes Networking protocols like BGP, RIP, TCP/IP, IP/Sec. From Vulnerability Management aspect I can do Threat analysis, Network assessment, Penetration Testing and Risk Mitigation Planning, In terms of Business Continuity Planning I can implement Incident Response
+
I have experience on Security Information and Event Management (SIEM), as a result I am familiar with the SIEM tool Splunk ES Security Information Manager. Integrating various security devices to the SIEM setup for log management and Analysis.
strategy, Disaster Recovery Planning and Cost Reduction Planning.
 
  
projects I carried out till now are "Microwave Probes : Tacking Person of Interest with Wi-Fi", "Geo-locating Email Sender with Social Engineering",
+
My prime work includes Security Log Monitoring and Analysis from various organizational network devices for Indian and foreign customers. I have a good log reading capability for devices such as IPS/ IDS, WAF, Checkpoint Firewall, CISCO ASA, CA Integrated Threat Management, Windows security Events, different OS logs, databases activity logs, End point protection, proxy logs, etc.
"Threat Analysis Of Wireless Network".
+
 
 +
Specialties: Security Information and Event Management (SIEM), Splunk ES, Security Log Monitoring, Deep Log Analysis, Incident response, Cyber Security, Digital Forensics.

Latest revision as of 06:15, 1 September 2016

As an Information Security Professional, I have good knowledge in understanding the architecture, design, management and controls that assures the security of business environments and incident handling through log analysis. Identifying the root causes of security incidents and collecting useful data for compliance reporting.

I have experience on Security Information and Event Management (SIEM), as a result I am familiar with the SIEM tool Splunk ES Security Information Manager. Integrating various security devices to the SIEM setup for log management and Analysis.

My prime work includes Security Log Monitoring and Analysis from various organizational network devices for Indian and foreign customers. I have a good log reading capability for devices such as IPS/ IDS, WAF, Checkpoint Firewall, CISCO ASA, CA Integrated Threat Management, Windows security Events, different OS logs, databases activity logs, End point protection, proxy logs, etc.

Specialties: Security Information and Event Management (SIEM), Splunk ES, Security Log Monitoring, Deep Log Analysis, Incident response, Cyber Security, Digital Forensics.