Banner Image

All Services

Programming & Development

IT Security Consultant/Advisor/Analyst

$5/hr Starting at $25

Building up of Use-cases, rules, reports, dashboards on Arcsight ESM, Splunk and Mcafee Nitro. Generated Reports to fulfill the PCI-DSS, ISO 27001 Compliance Reporting Needs. Developed and Implemented Information Security Policies and Procedures. Implemented Change Management system with change verification Setting up alerting and monitoring processes, escalation matrix, turnaround time, response times Operations handover. Preparation of Log baseline for different categories of devices. Creating alerts and reports as per business requirements and Threat Modeling with specific security control requirements. Conducted ITGC reviews which covers user access management controls, change management control, SOD, authorization, privilege access control, periodic access reviews and physical controls. Perform Vulnerability assessments on projects Configuring log generation and collection from a wide variety of products distributed across categories of servers, network devices, security devices, databases and applications. Installing and managing the Splunk Forwarders Operate and utilize the SIEM toolset to investigate and triage security events, provide reporting and analysis, and ensure all systems are reporting into the SIEM toolset appropriately. Configuration and health monitoring or perimeter and network security devices such as firewalls, UTM’s, IDP etc. Analysis of security incidents triggered by the devices, ensuring security of the network with real-time incident management. Managing flow of security device logs, parsing and correlation of logs from several types of devices. Report generation and resource allocation based on customer requirements. Providing threat and vulnerability details to ascertain all round safety. Writing Technical Knowledge Base for unknown issues & tested procedure thereby efficiently managing client’s devices Responsible for configuration of Cyberoam firewalls, SSL VPNs and Cyberoam Central Console, i-View (open source logging software), Endpoint Data Protection Security/Data Leakage Prevention, remotely. Understood customer requirements, Network Infrastructure & Prepare Network Diagrams. Providing Gateway Antispam (Comtouch) and Antivirus (Kaspersky) solutions with Cyberoam. Designed the security and work interactively with other

About

$5/hr Ongoing

Download Resume

Building up of Use-cases, rules, reports, dashboards on Arcsight ESM, Splunk and Mcafee Nitro. Generated Reports to fulfill the PCI-DSS, ISO 27001 Compliance Reporting Needs. Developed and Implemented Information Security Policies and Procedures. Implemented Change Management system with change verification Setting up alerting and monitoring processes, escalation matrix, turnaround time, response times Operations handover. Preparation of Log baseline for different categories of devices. Creating alerts and reports as per business requirements and Threat Modeling with specific security control requirements. Conducted ITGC reviews which covers user access management controls, change management control, SOD, authorization, privilege access control, periodic access reviews and physical controls. Perform Vulnerability assessments on projects Configuring log generation and collection from a wide variety of products distributed across categories of servers, network devices, security devices, databases and applications. Installing and managing the Splunk Forwarders Operate and utilize the SIEM toolset to investigate and triage security events, provide reporting and analysis, and ensure all systems are reporting into the SIEM toolset appropriately. Configuration and health monitoring or perimeter and network security devices such as firewalls, UTM’s, IDP etc. Analysis of security incidents triggered by the devices, ensuring security of the network with real-time incident management. Managing flow of security device logs, parsing and correlation of logs from several types of devices. Report generation and resource allocation based on customer requirements. Providing threat and vulnerability details to ascertain all round safety. Writing Technical Knowledge Base for unknown issues & tested procedure thereby efficiently managing client’s devices Responsible for configuration of Cyberoam firewalls, SSL VPNs and Cyberoam Central Console, i-View (open source logging software), Endpoint Data Protection Security/Data Leakage Prevention, remotely. Understood customer requirements, Network Infrastructure & Prepare Network Diagrams. Providing Gateway Antispam (Comtouch) and Antivirus (Kaspersky) solutions with Cyberoam. Designed the security and work interactively with other

Skills & Expertise

AnalyticsCloudCompliance ConsultingConsultantData ManagementFirewallsIpsISO 27001ManagementModelingNetworkingOperations ManagementReport WritingReportsReviewsRisk ManagementSecuritySiemSplunkSSLSystems Engineering

0 Reviews

This Freelancer has not received any feedback.