Personal Information
Entreprise/Lieu de travail
Chennai Area, India India
Profession
SOC Analyst at Doosan Infracore International
Site Web
http://www.9tut.com
À propos
Experience in Networking and Linux Platform.Holding (CISCO CERTIFIED NETW0RK ASSOCIATE (CCNA) and RHCE (Redhat Linux certified Engineer) . Having some exposure in Vulnerability Assessment as Technical Support Consultant for McAfee Secure and SIEM platforms for log management as support engineer in SecureVue for EiQ Networks.I worked previously as Security Engineer at SQS India BFSI Limited and worked on SIEM and network VAPT Platforms. I am currently working as SOC Analyst at Doosan Infracore
- Présentations
- Documents
- Infographies
Cloud security best practices in AWS by: Ankit Giri
OWASP Delhi
•
il y a 8 ans
Securing your vpc in aws
vinoth kumar
•
il y a 6 ans
Null Mumbai 14th May Lesser Known Webapp attacks by Ninad Sarang
nullowaspmumbai
•
il y a 7 ans
Pentesting Cloud Environment
Vengatesh Nagarajan
•
il y a 7 ans
AWS Cloud Account Hacked
Ali Raza
•
il y a 7 ans
Advanced Web Services Hacking (AusCERT 06)
Shreeraj Shah
•
il y a 17 ans
Webservices Workshop - september 2014
clairvoyantllc
•
il y a 7 ans
Web Services (SOAP, WSDL, UDDI)
Peter R. Egli
•
il y a 12 ans
Webservices Overview : XML RPC, SOAP and REST
Pradeep Kumar
•
il y a 9 ans
Web Services Presentation - Introduction, Vulnerabilities, & Countermeasures
Praetorian
•
il y a 13 ans
The top 10 windows logs event id's used v1.0
Michael Gough
•
il y a 8 ans
Bug Bounty Hunter Methodology - Nullcon 2016
bugcrowd
•
il y a 8 ans
Kali net hunter
Prashanth Sivarajan
•
il y a 7 ans
Webservice Testing
Rachana Khedekar
•
il y a 8 ans
Securty Testing For RESTful Applications
Source Conference
•
il y a 12 ans
Monk who sold his ferrari
Rohit Ravindran
•
il y a 9 ans
Advanced Threats and Lateral Movement Detection
Greg Foss
•
il y a 8 ans
Session 7.3 Implementing threat intelligence systems - Moving from chaos to structure
Puneet Kukreja
•
il y a 8 ans
Cyber Threat Intelligence
mohamed nasri
•
il y a 9 ans
Cyber threat intelligence: maturity and metrics
Mark Arena
•
il y a 8 ans