Personal Information
Entreprise/Lieu de travail
New Delhi Area, India India
Profession
CEH | CHFI | CISE | MCP | CTIA | CySa+ | ECIH | MCTS
Secteur d’activité
Technology / Software / Internet
Site Web
www.prohackers.in
À propos
• A technology driven professional with over 5+ years of experience in IT operation, including Computer Hardware and Networking and Information Security
• Highly Competent and experienced in handling real-time Cyber Security incidents and attacks and quickly and effectively
• Have hands-on experience in different domains of Information Security such as VAPT, SOC Monitoring with specialization in Cyber Threat Hunting
• Currently serves as Threat Hunter at NII focusing on finding the security threats, Abnormal Behavior of systems and Security Gaps
• Performed threat hunting on Qradar SIEM Tool, Elastic Search Stack
Mots-clés
hacking
education and training
information technology
information security
education
cyber security
knowledge
educacion
e-mail security
technology
learning
cyber awareness
threat analysis
threat hunting
interview
firewall
networking
virus
training
Tout plus
Présentations
(15)Documents
(7)J’aime
(2)The Fundamental of Electronic Mail (E-mail)
Vishal Kumar
•
il y a 6 ans
Information gathering using windows command line utility
Vishal Kumar
•
il y a 7 ans
Personal Information
Entreprise/Lieu de travail
New Delhi Area, India India
Profession
CEH | CHFI | CISE | MCP | CTIA | CySa+ | ECIH | MCTS
Secteur d’activité
Technology / Software / Internet
Site Web
www.prohackers.in
À propos
• A technology driven professional with over 5+ years of experience in IT operation, including Computer Hardware and Networking and Information Security
• Highly Competent and experienced in handling real-time Cyber Security incidents and attacks and quickly and effectively
• Have hands-on experience in different domains of Information Security such as VAPT, SOC Monitoring with specialization in Cyber Threat Hunting
• Currently serves as Threat Hunter at NII focusing on finding the security threats, Abnormal Behavior of systems and Security Gaps
• Performed threat hunting on Qradar SIEM Tool, Elastic Search Stack
Mots-clés
hacking
education and training
information technology
information security
education
cyber security
knowledge
educacion
e-mail security
technology
learning
cyber awareness
threat analysis
threat hunting
interview
firewall
networking
virus
training
Tout plus