0% found this document useful (0 votes)
18 views

Suraj Ghorpade

Suraj Balaram Ghorpade is an experienced Information Security Analyst with 14 years of expertise, currently working as a Senior Solution Architect at Tata Consultancy Services. His experience includes implementing security solutions, conducting incident investigations, and managing security programs, with proficiency in various SIEM tools and cybersecurity practices. He holds a Bachelor's degree in Management Studies and a certification as a Certified Ethical Hacker.

Uploaded by

mpadala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Suraj Ghorpade

Suraj Balaram Ghorpade is an experienced Information Security Analyst with 14 years of expertise, currently working as a Senior Solution Architect at Tata Consultancy Services. His experience includes implementing security solutions, conducting incident investigations, and managing security programs, with proficiency in various SIEM tools and cybersecurity practices. He holds a Bachelor's degree in Management Studies and a certification as a Certified Ethical Hacker.

Uploaded by

mpadala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

SURAJ BALARAM GHORPADE

Ph: (M) 9167307939, Email: [email protected] DOB- 12th Nov1988


16\404, Mahavir Vatika CHS, Sai Nagar, Old Panvel, Panvel 410206

OBJECTIVE

To develop a career as an Information Security Analyst in a growing company where my skills and experience
will be utilized in achieving the goals and objectives of the organization. Result oriented, Proactive and
industrious Architect with around 14 years’ experience

EXPERIENCE

Tata Consultancy Services:

Senior Solution Architect (2022- Present)

 Implementation and POC completed for IBM Qradar, and Splunk.


 Use Case deployment, Log source onboarding.
 Experience in HLD and LLD.
 Functional teams. Work effectively with people of all levels of IT expertise and a wide range of
constituencies, experience, and organizational relationships
 Provides support as an information security subject matter expert to department or business units for
relevant business or system processes
 The ability to analyze, mitigate and report technical and non-technical risks within the customer’s
computing enclave
 Experience with and understanding of compiled and interpreted programs and the types of security
issues possible in each; database systems, web servers, application servers, firewalls, routers, load
balancers, switches, and different types of middleware.
 Evaluate IT systems, appliances, and devices being proposed for use within the environment and their
ability to meet security requirements, recommending mitigating controls for identified limitations and
risks

Solution Architect (2018 -2022)

 Implementation completed for Google Chronical, Log360.


 Implemented Phishing simulation tools knowbe4 and Ironscale.
 Implemented Email security tools Proofpoint.
 Incident Investigation and Reporting complete Root cause analysis of the information security
incidents to management.
 Recommendation of Corrective and Preventive actions post incident analysis
 Recommendations for SIEM (HP Arcsight) rule optimization to attenuated false positive incident
reporting.
 Delivered process documentation, Assisted in process improvement. resolutions;
 Create reports for assigned areas of responsibility; Manage Security Programs; Offer new ideas and
suggestions for improvement.
 Creates reports and metric to report to management.
 Quick learner, adept in learning new technologies and quickly adapting to new environment;
Demonstrate an ability to analyze issues, expedite innovative solutions and consensus-driven
environment that contributes to on-quality, on-time project delivery; trustworthy, ethical and
discreet.
 Working with global Security Team to provide 24 * 7 supports for running effective security
operations.
 Troubleshooting technical issues with performance, and overall functioning of the monitoring
infrastructure.
 Escalate all issues in time, to the appropriate level, to avoid any adverse impact and reputational risk
on the business.

Project - 1 (2015 – 2018)

 We analyze the Clearsky report.


 We analyze the Minerva alert evasion technique and Injection prevention.
 We analyze Windows DefenderATP alert and take appropriate action as per severity of incident.
 Monitor suspicious email reported by user via Ironscales.
 Monitor various network incident via Trapx.
 Check machine compliance via Mcafee and trend micro office scan.
 We are checking suspicious files and URL on Trend Micro DDA.
 Monitor various device logs integrated with Arcsight and take appropriate action as directed by client
for various incidents.
 Preparing Analysis and trend report for the organization on weekly, Investigates and/or escalates
security violations, attempts to gain unauthorized access, virus infections that may affect the network
or other event affecting security.
 Analyzing a reporting Phishing URLs to the respective vendors to get the site down.
 Analyze products, systems, projects, and concepts and document their role in the cybersecurity
architecture, tracing their value to business requirements and their effectiveness at supporting
policies
 Work with project leads, developers, network engineers, and cybersecurity peers, to design and
maintain a highly secure infrastructure
 Communicate the business vision, requirements, policies, physical, and operational elements of
system and security architecture
 Communicate technologies, protocols, boundaries, system interfaces, APIs, dependencies,
interactions, and products of and component architecture to audiences including executives and
engineers
 Work with experts to identify, document, and track weak points in the architecture based on
standardized methodologies and innovative analysis.

Wipro InfoTech Mumbai (Mar 2012 – Jan 2015) SOC Analyst

One of the Leading Private Sector Bank in India (Information Security Engineer)

 Understanding the whole network & requirement of the organization.


 Accordingly designing the architecture and plan daily activity schedule for implementation.
 Implementation of Symantec Security Information Manager (SIEM Tool) in the organization.
 DDoS monitoring
1. Continuous monitoring of DDoS portal of Bharti Airtel & Tata telecommunications
2. L1/L2 investigation & Co-ordination with Network team, Network Security team,
Application/website owner & Bharti Airtel/TCL to validate the traffics
3. If no business requirement, post ISG approval logs ticket at portal to mitigate the traffic.
 Ensuring the SLA's are met (SLA's related to Monitoring, Management, Alerting, Reporting)
 Analysis Incidents and reporting to management till RCA.
 Detecting Phishing and then coordination with ISP to block it.
 IPS signature review

Zenith Infotech (July 2010 – Dec 2010) Desktop Support Engineer.

 Directed the deployment of operating system updates to 2,000+ workstations, resulting in a 75%
decrease in system vulnerabilities.
 Enhanced the customer support portal, cutting down issue resolution time by 25%

 Provided timely technical support to staff, improving overall satisfaction rates by 90%
 Contributed to the installation of VoIP phones in over 300 office locations
 Helped streamline software licensing records, avoiding potential non-compliance fines.

Embee Software Mumbai (Jan 2011 – Mar 2012) Senior Desktop Support Engineer

 Streamlined the ticketing process using Jira, leading to a 30% decrease in average response time for IT
support queries
 Antivirus installation, OS installation, Asset Management, Hardware Replacement.
 Pioneered a remote desktop protocol that improved productivity by allowing 80% of support issues to be
resolved off-site
 Designed and delivered training workshops on cybersecurity practices, increasing staff compliance by
95%

TECHNICAL QULIFICATION

Network Technologies Basic Knowledge about Networking Devices Switches, Routers,


Firewalls and IPS.
Virtualization Tools VMware Workstations.
Phishing Response Tool Ironscale, Knowbe4, Proffpoint
SIEM Tools HP Arcsight,Symantec SSIM, IBM Qradar, Splunk, Log 360,
Google Chronicle
Malware Analysis Minerva, Cearsky TrapX, Trend Micro DDA, Windows Defender
ATP, Damware.

ACADEMIC PROFILE

 Secondary Education from Maharashtra Board with 58.00% marks.


 Higher Secondary from Maharashtra Board with 54% marks
 BMS (Bachelor of Management Studies) from Mumbai University with Pass class
 Diploma in Hardware and Networking form Jetking institute.

EXTERNAL CERTIFICATION
Certified Ethical Hacker V12

PERSONAL INFORMATION

Father’s Name : Balaram Gangaram Ghorpade


Marital Status : Married
Hobbies : Playing & watching Cricket, Listening Music
Languages Known : English, Hindi and Marathi

DECLARATION

I hereby declare that the above furnished information is true to my knowledge and belief.

Place: Mumbai

Date: Signature

You might also like