SlideShare a Scribd company logo
Personal Information
Organization / Workplace
New Delhi Area, India India
Occupation
CEH | CHFI | CISE | MCP | CTIA | CySa+ | ECIH | MCTS
Industry
Technology / Software / Internet
About
• A technology driven professional with over 5+ years of experience in IT operation, including Computer Hardware and Networking and Information Security • Highly Competent and experienced in handling real-time Cyber Security incidents and attacks and quickly and effectively • Have hands-on experience in different domains of Information Security such as VAPT, SOC Monitoring with specialization in Cyber Threat Hunting • Currently serves as Threat Hunter at NII focusing on finding the security threats, Abnormal Behavior of systems and Security Gaps • Performed threat hunting on Qradar SIEM Tool, Elastic Search Stack
Contact Details

Presentations(15

See all
Auditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrackAuditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrack
 
Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
Dumping and Cracking SAM Hashes to Extract Plaintext PasswordsDumping and Cracking SAM Hashes to Extract Plaintext Passwords
Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
 
Fundamental of Secure Socket Layer (SSL) | Part - 2
Fundamental of Secure Socket Layer (SSL) | Part - 2 Fundamental of Secure Socket Layer (SSL) | Part - 2
Fundamental of Secure Socket Layer (SSL) | Part - 2
 

Documents(7

See all
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallThe Complete Questionnaires About Firewall
The Complete Questionnaires About Firewall
 
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)