SlideShare a Scribd company logo
Tarunidhar Chitirala
tarunidhar.chitirala@gmail.com
Contact: +91-9701725076
Career Objective:
Seek a position to utilize my skills and abilities in corporate world that offers professional growth while being
resourceful, innovative and flexible
Profile Summary:
 2 years and 9 month of experience in IT Security, analyzing & responding to security threats. Strong
understanding of network & security management.
 Evaluating business risk based on the vulnerabilities and asset criticality.
 Investigate potential or actual security violations or incidents in an effort to identify issues and areas that
require new security measures or policy changes.
 Analytical and detail oriented approach to problem solving. Strong work ethic, excellent communication
and trouble-shooting skills.
Professional Skill-set:
Domain
Knowledge
Network Security, Incident Response, Penetration Testing
Operating
systems
Windows, Redhat, Cent OS, Kali Linux
Languages 1.Good scripting knowledge in C/C++/Python.
2.Writing web scraping/Automation scripts in Python
3. Shell scripting
4. Knowledge in Core JAVA, SQL
Firewall
Technologies
Cisco, Checkpoint
VA/PT QualysGuard Vulnerability Manager, Nmap, Metasploit, Burp Suite,
Selenium
Forensics/SIEM RSA Envision, SA for logs/Packets, FireEYE HX-AX-EX
Log Analysis McAfee IPS, Websense, Symantec AV, Cisco Fireamp,
Training Attended RSA Security Analytics Administration, Workshop on Penetration
Testing, Application Security from EY, McAfee IntruShield from
McAfee
Certifcations:
 QualysGuard Certified Specialist – Vulnerability Management
 RedHat System Administrator Course Completion
WorkExperience:
1. HCL Technologies: Dec’2013 – Present
 HCLTechnologies-Corp Project(Chennai)
Working as Security Engineer responsible for implementation ,managing and administering of
SIEM tool RSA Security Analytics(both SA for Logs & SA for Packets) (ver.10.3 – 10.5). Monitoring and
analysing Security Events as part of Analyst Team. Implementing Vulnerability Manager(QualysGuard)
solution across the network.
 Role & Responsibilities include:
 Logs monitoring and management through SIEM tool (RSA Security analytics, Envision)
 Implementation, Deployment and configuring of Concentrator, Decoder, ESA, Archiver, Malware
Analysis servers
 User creation/modification/deletion on SIEM tools, Vulnerability Manager
 Ensure all IT assets are duly monitored, and work with the relevant team to integrate new assets.
 Real-Time Monitoring, Analysis, Reporting and Escalations of security Events from Multiple log
resources.
 Create, modify and review rules as per the requirement.
 Creation & Fine Tuning of Rules/Reports/Dashboard and RSA Rules
 Continuously monitoring of Dashboard for Log volumes, outages, device down, etc.
 Device integration, troubleshooting, follows up with Integration teams in case Support req.
 Writing IOCs in HX for Presence/Execution of Infection in the Endpoint using Threat Intel.
 Vulnerability Assessment through QualysGuard
 Scans for, identifies and assesses vulnerabilities in IT systems including computers, networks, software
systems, information systems, and applications software.
 Constant updating of Latest Threats and Updating custom Watchlist for malicious domains
 Installed and managing VMinfra lab for SIRT team
 Raising incidents on the basis of traffic analysis and device monitoring through ticket tool BMC
Remedy, RSA Secops.
 Responsible and accountable for logging incident management system and assist in generating reports
based on security incidents.
 Monitoring the Network Security devices like Firewall (Cisco, Checkpoint), IPS
(McAfee),Proxy(Websense), FireEYE(EX,NX,HX)
 Configured daily and weekly Reports for Security devices as per the Clients requirements and preparing
monthly analysis report for clients which based on entire month traffic analysis.
 Monitor the security of critical systems (e.g., e-mail servers, database servers, web servers, Firewalls,
IDS/IPS etc.) and changes to highly sensitive computer security controls to ensure appropriate system
administrative actions investigate and report on noted irregularities.
 Alerting customer if any security breaches, Preparation of daily, weekly and monthly reports
 Part of Enterprise Incident Management team and handling client related incidents and taking all the
corrective actions and preventive measures.
 Understanding of Encase Forensics analysis tool.
 Creating new process documents which would help the Analyst in analyzing events.
 Recommended USE cases for Threat, Database, Identity and access management etc
Education:
 Completed B.Tech(Electronics & Communication Engineering) from GITAM University Visakhapatnam
in 2012 with 7.71 CGPA
 Completed Intermediate (MPC) through the Board of Intermediate Education,AP in 2008 with an
aggregate of 94.5%.
Personal Details:
Name: Tarunidhar Chitirala
Date of Birth: 01/APR/1991
Father’s Name: Devanjaneyulu Chitirala
Gender: Male
Marital Status: Single
Languages Known: Tamil, Telugu & English
Nationality: Indian
Declaration
I hereby declare that the above furnished information is correct up to my knowledge and I bear the
responsibility of correctness of the above mentioned particulars.
Place:
Date: Tarunidhar Chitirala

More Related Content

PPTX
Skills that make network security training easy
PPTX
A Brief Introduction to Penetration Testing
PPTX
Vulnerability Assesment
PDF
Best vulnerability assessment training
PPTX
Vulnerability Assessment
PPTX
Red Team vs. Blue Team
PDF
Presentation on vulnerability analysis
PPT
Software security engineering
Skills that make network security training easy
A Brief Introduction to Penetration Testing
Vulnerability Assesment
Best vulnerability assessment training
Vulnerability Assessment
Red Team vs. Blue Team
Presentation on vulnerability analysis
Software security engineering

What's hot (20)

PPTX
6 Most Popular Threat Modeling Methodologies
PPTX
Application security
DOCX
Php developer
PPTX
Security operation center (SOC)
PPTX
Software Security
PPT
Application Security
PPTX
Application Threat Modeling
PPTX
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PPTX
Rothke rsa 2012 building a security operations center (soc)
PPTX
Classification of vulnerabilities
PPTX
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
PPTX
what is security
PPTX
CyberSecurity Strategy For Defendable ROI
PPT
Layered Approach - Information Security Recommendations
PDF
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PPTX
5 things i wish i knew about sast (DSO-LG July 2021)
6 Most Popular Threat Modeling Methodologies
Application security
Php developer
Security operation center (SOC)
Software Security
Application Security
Application Threat Modeling
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
Rothke rsa 2012 building a security operations center (soc)
Classification of vulnerabilities
NTXISSACSC2 - Threat Modeling Part 1 - Overview by Brad Andrews
what is security
CyberSecurity Strategy For Defendable ROI
Layered Approach - Information Security Recommendations
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
5 things i wish i knew about sast (DSO-LG July 2021)
Ad

Viewers also liked (12)

PDF
Madalena
PDF
Los inicios de la agricutura1
PDF
PDF
Primera revolución industrial
PPTX
La segunda revolución industrial
PDF
Microsoft CRM xRM4Legal 2015 Enterprise Case Management
PDF
40 hours radiation
PDF
CHSEP1
PDF
El emperador justiniano
PPT
2º ano colonização 2 e escravidão
PPT
Kapa 3 iluminismo e revolução francesa
PPT
Anglo enem aula 10
Madalena
Los inicios de la agricutura1
Primera revolución industrial
La segunda revolución industrial
Microsoft CRM xRM4Legal 2015 Enterprise Case Management
40 hours radiation
CHSEP1
El emperador justiniano
2º ano colonização 2 e escravidão
Kapa 3 iluminismo e revolução francesa
Anglo enem aula 10
Ad

Similar to tarunidhar (20)

DOCX
Abhishek-New (1)
DOCX
Dhishant -Latest Resume
DOC
Prabhu Resume
DOCX
Lancy-Curriculum Vitae
DOC
Deepika_Resume
DOC
Shashikant Chavan_Resume
PDF
Ramamurthy Security Manager1
DOC
Venkatesh M S - Security Audit and Compliance
PDF
Noel_De_Leon_Alvior_CV
PDF
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
DOCX
Ramamurthy security manager1
PDF
Girish Dambal Ver 1.1
DOC
Pramod Yadav_Security Operations Center Manager
PDF
Cv gulam rasool
DOCX
Sanjoy debnath resume
DOC
Chris siteminder
DOCX
Imran Resume
DOCX
Jacksons Resume_21March16
DOCX
Saravanan_Resume_IBM Updated
DOCX
Dinesh_Resume
Abhishek-New (1)
Dhishant -Latest Resume
Prabhu Resume
Lancy-Curriculum Vitae
Deepika_Resume
Shashikant Chavan_Resume
Ramamurthy Security Manager1
Venkatesh M S - Security Audit and Compliance
Noel_De_Leon_Alvior_CV
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Ramamurthy security manager1
Girish Dambal Ver 1.1
Pramod Yadav_Security Operations Center Manager
Cv gulam rasool
Sanjoy debnath resume
Chris siteminder
Imran Resume
Jacksons Resume_21March16
Saravanan_Resume_IBM Updated
Dinesh_Resume

tarunidhar

  • 1. Tarunidhar Chitirala tarunidhar.chitirala@gmail.com Contact: +91-9701725076 Career Objective: Seek a position to utilize my skills and abilities in corporate world that offers professional growth while being resourceful, innovative and flexible Profile Summary:  2 years and 9 month of experience in IT Security, analyzing & responding to security threats. Strong understanding of network & security management.  Evaluating business risk based on the vulnerabilities and asset criticality.  Investigate potential or actual security violations or incidents in an effort to identify issues and areas that require new security measures or policy changes.  Analytical and detail oriented approach to problem solving. Strong work ethic, excellent communication and trouble-shooting skills. Professional Skill-set: Domain Knowledge Network Security, Incident Response, Penetration Testing Operating systems Windows, Redhat, Cent OS, Kali Linux Languages 1.Good scripting knowledge in C/C++/Python. 2.Writing web scraping/Automation scripts in Python 3. Shell scripting 4. Knowledge in Core JAVA, SQL Firewall Technologies Cisco, Checkpoint VA/PT QualysGuard Vulnerability Manager, Nmap, Metasploit, Burp Suite, Selenium Forensics/SIEM RSA Envision, SA for logs/Packets, FireEYE HX-AX-EX Log Analysis McAfee IPS, Websense, Symantec AV, Cisco Fireamp, Training Attended RSA Security Analytics Administration, Workshop on Penetration Testing, Application Security from EY, McAfee IntruShield from McAfee Certifcations:  QualysGuard Certified Specialist – Vulnerability Management  RedHat System Administrator Course Completion WorkExperience:
  • 2. 1. HCL Technologies: Dec’2013 – Present  HCLTechnologies-Corp Project(Chennai) Working as Security Engineer responsible for implementation ,managing and administering of SIEM tool RSA Security Analytics(both SA for Logs & SA for Packets) (ver.10.3 – 10.5). Monitoring and analysing Security Events as part of Analyst Team. Implementing Vulnerability Manager(QualysGuard) solution across the network.  Role & Responsibilities include:  Logs monitoring and management through SIEM tool (RSA Security analytics, Envision)  Implementation, Deployment and configuring of Concentrator, Decoder, ESA, Archiver, Malware Analysis servers  User creation/modification/deletion on SIEM tools, Vulnerability Manager  Ensure all IT assets are duly monitored, and work with the relevant team to integrate new assets.  Real-Time Monitoring, Analysis, Reporting and Escalations of security Events from Multiple log resources.  Create, modify and review rules as per the requirement.  Creation & Fine Tuning of Rules/Reports/Dashboard and RSA Rules  Continuously monitoring of Dashboard for Log volumes, outages, device down, etc.  Device integration, troubleshooting, follows up with Integration teams in case Support req.  Writing IOCs in HX for Presence/Execution of Infection in the Endpoint using Threat Intel.  Vulnerability Assessment through QualysGuard  Scans for, identifies and assesses vulnerabilities in IT systems including computers, networks, software systems, information systems, and applications software.  Constant updating of Latest Threats and Updating custom Watchlist for malicious domains  Installed and managing VMinfra lab for SIRT team  Raising incidents on the basis of traffic analysis and device monitoring through ticket tool BMC Remedy, RSA Secops.  Responsible and accountable for logging incident management system and assist in generating reports based on security incidents.  Monitoring the Network Security devices like Firewall (Cisco, Checkpoint), IPS (McAfee),Proxy(Websense), FireEYE(EX,NX,HX)  Configured daily and weekly Reports for Security devices as per the Clients requirements and preparing monthly analysis report for clients which based on entire month traffic analysis.  Monitor the security of critical systems (e.g., e-mail servers, database servers, web servers, Firewalls, IDS/IPS etc.) and changes to highly sensitive computer security controls to ensure appropriate system administrative actions investigate and report on noted irregularities.  Alerting customer if any security breaches, Preparation of daily, weekly and monthly reports  Part of Enterprise Incident Management team and handling client related incidents and taking all the corrective actions and preventive measures.  Understanding of Encase Forensics analysis tool.  Creating new process documents which would help the Analyst in analyzing events.  Recommended USE cases for Threat, Database, Identity and access management etc
  • 3. Education:  Completed B.Tech(Electronics & Communication Engineering) from GITAM University Visakhapatnam in 2012 with 7.71 CGPA  Completed Intermediate (MPC) through the Board of Intermediate Education,AP in 2008 with an aggregate of 94.5%. Personal Details: Name: Tarunidhar Chitirala Date of Birth: 01/APR/1991 Father’s Name: Devanjaneyulu Chitirala Gender: Male Marital Status: Single Languages Known: Tamil, Telugu & English Nationality: Indian Declaration I hereby declare that the above furnished information is correct up to my knowledge and I bear the responsibility of correctness of the above mentioned particulars. Place: Date: Tarunidhar Chitirala