Personal Information
Entreprise/Lieu de travail
Chennai Area, India India
Profession
SOC Analyst at Doosan Infracore International
Site Web
http://www.9tut.com
À propos
Experience in Networking and Linux Platform.Holding (CISCO CERTIFIED NETW0RK ASSOCIATE (CCNA) and RHCE (Redhat Linux certified Engineer) . Having some exposure in Vulnerability Assessment as Technical Support Consultant for McAfee Secure and SIEM platforms for log management as support engineer in SecureVue for EiQ Networks.I worked previously as Security Engineer at SQS India BFSI Limited and worked on SIEM and network VAPT Platforms. I am currently working as SOC Analyst at Doosan Infracore
- Présentations
- Documents
- Infographies
Making Log Data Useful: SIEM and Log Management Together
Anton Chuvakin
•
il y a 13 ans
SIEM Primer:
Anton Chuvakin
•
il y a 12 ans
Windows Event Analysis - Correlation for Investigation
Mahendra Pratap Singh
•
il y a 9 ans
Kali net hunter
Prashanth Sivarajan
•
il y a 7 ans
AppSec USA 2015: Customizing Burp Suite
August Detlefsen
•
il y a 8 ans
SIEM - Your Complete IT Security Arsenal
ManageEngine EventLog Analyzer
•
il y a 10 ans
AWS Security Overview and “What’s New”
Amazon Web Services
•
il y a 8 ans
Monk who sold his ferrari
Rohit Ravindran
•
il y a 9 ans
SIEM in NIST Cyber Security Framework
Bernie Leung, P.E., CISSP
•
il y a 8 ans
Hack like a pro with burp suite - nullhyd
n|u - The Open Security Community
•
il y a 8 ans
Splunk Cloud
Splunk
•
il y a 8 ans
IT Security: Eliminating threats with effective network & log analysis
ManageEngine, Zoho Corporation
•
il y a 9 ans
BSides Lisbon 2013 - All your sites belong to Burp
Tiago Mendo
•
il y a 10 ans
Web Services Presentation - Introduction, Vulnerabilities, & Countermeasures
Praetorian
•
il y a 13 ans
Big data Propels SIEM into the era of Security Analytics
EMC
•
il y a 11 ans
Fun & profit with bug bounties
n|u - The Open Security Community
•
il y a 9 ans
Amazon Web Services Security
Jason Chan
•
il y a 9 ans
Web application Security tools
Nico Penaredondo
•
il y a 8 ans
Information Security: Advanced SIEM Techniques
ReliaQuest
•
il y a 9 ans
Session 7.3 Implementing threat intelligence systems - Moving from chaos to structure
Puneet Kukreja
•
il y a 8 ans