E D U C A T I O N
Doctorate
Shoolini University
2024 - Present
Ph.D. in Cyber Security
Post Graduation
Chandigarh University
2020 - 2022
Masters of Computer Application (MCA)
Graduation
Maharishi Markandeshwar (Deemed to be University)
2017 – 2020
Bachelor of Computer Application (BCA)
P R O F I L E
Cyber Security Specialist specializing in Incident Response. Proficient in analyzing incident nature and impact, coordinating response efforts, and documenting findings. Adept at monitoring security alerts, analyzing threats, and implementing effective countermeasures to maintain a secure environment. Dedicated to enhancing incident response capabilities and advancing industry knowledge through practical experience.
T O O L S A N D E X P E R T I S E
- IBM QRadar SIEM
- IBM Resilient SOAR
- Microsoft Azure
- Microsoft Cloud App Security (MCAS)
- Microsoft 365 Security/Defender
- Microsoft Threat Protection (MTP)
- O365 ATP and Microsoft Threat Explorer
- Crowdstrike Falcon
- Azure Advanced Threat Protection (ATP)
- Cyjax Domain Monitoring and Threat Intelligence
- Vectra, Cognito Recall
- Network Packet analysis using Wireshark
- WAF Akamai Kona - Traffic inspection
- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
T R A I N I N G A N D C E R T I F I C A T E S
- Certified Ethical Hacker (CEH)
- Microsoft Certified: Security Operations Analyst (SC-200)
- Certified Information Security Manager (CISM EXAM)
- IBM QRadar SIEM Foundation
- Cisco Certified Network Associate (CCNA)
- Microsoft Certified: Azure Fundamentals (AZ-900)
- Cyber Crime Intelligence Expert and Ethical Hacker
W O R K E X P E R I E N C E
Cyber Security Specialist - L3
IBM India
March 2021 - January 2024
- Managing and leading security projects and initiatives, ensuring timely delivery and budget adherence.
- Conducting malware analysis and forensics to identify and neutralize threats.
- Performing email forensics and phishing analysis to protect against targeted attacks.
- Mentoring and guiding security teams, facilitating knowledge transfer to junior analysts.
- Providing senior management and key stakeholders with insights into security challenges.
- Leading and executing comprehensive incident response activities, including triage, analysis, containment, eradication, and recovery.
- Conducting in-depth investigations and root cause analyses to understand the nature and impact of security breaches.
- Collaborating with cross-functional teams to ensure alignment on security initiatives and incident response strategies.
- Proactively identifying and mitigating potential security risks through continuous monitoring and analysis.
Cyber Security Consultant - L2
IBM India
October 2023 - January 2024
- Investigating and managing security incidents, including analyzing the nature and impact of incidents, coordinating response efforts, and documenting findings.
- Monitoring security alerts generated by various tools, assessing their urgency and relevance, and escalating genuine threats to appropriate teams.
- Assisting in identifying, prioritizing, and remediating vulnerabilities in systems and applications to maintain a secure environment.
- Reviewing logs from various sources to detect anomalous or suspicious activities, aiding in the early detection of potential breaches.
- Analyzing malware samples to understand their behavior, origins, and potential impact, and developing strategies to prevent and mitigate malware threats.
- Maintaining accurate records of security incidents, investigations, procedures, and findings, ensuring compliance and knowledge sharing.
- Working closely with other security teams, IT departments, and relevant stakeholders to ensure a coordinated response to security incidents and effective communication.
- Utilizing and maintaining security tools such as SIEM platforms, IDS/IPS systems, and XDR to enhance threat detection and response capabilities.
- Generating regular and ad-hoc reports on security incidents, trends, and improvements to inform decision-making and demonstrate security posture.
S K I L L S
- Incident Response and Management
- Security Operations Center (SOC)
- Information Security
- Malware Analysis
- Phishing Analysis
- Email Forensics
- Collaboration and Teamwork
- Risk Assessment and Management
- Compliance Management
- Security Awareness Training
R E S E A R C H A N D P U B L I C A T I O N S
- Elucidating Ransomware Attacks in Cyber-Security | Scopus – Elsevier
- The Deep Web and the Insidious Dark Web - RTCAIT'2019
- Internet of Medical Things (IoMT): Cyber Threats and Mitigation Strategies in Digital Healthcare - Ongoing
A V A I L A B I L I T Y
Immediate Joiner
C O N T A C T
Cyrus Mehra
Himachal Pradesh, India
+91 9625653100
contact@cyrusmehra.com
www.cyrusmehra.com
www.me.cyrusmehra.com
www.linkedin.com/in/cyrusmehra