Hi There,
I have 4+ Years of experience as Security Analyst in Intelligence Security Operation Center (ISOC) environment on Qradar, Splunk, ELK and Akamia WAF. Perform Security SIEM Operational task - Analysis, Filters, Active channels, Reports, Suggestion of fine tuning on existing rules. Trained in Qradar, Akamai WAF.
I can completely understand you requirement that you need a Wazuh SIEM setup for monitoring the security operations for your organization.I have a good experience in integration as well as creating rules for alerts.
Good Knowledge on TCP/IP, security concepts, WAN and LAN concepts, Routing protocols, Firewall security policies. Working on assign ticket queue and understanding and exceeding expectations on all tasked SLA commitments. Escalating issues to level2 and management when necessary. Watch Active Channels/ Dashboards and create annotations. Investigate incidents using Active Channels/ Dashboards/Events/Graphs/Annotations and reports. Monitor real-time security events on SIEM (Qradar) console and Event Analysis and Investigating and mitigation. Good understanding on different types of attacks. Working in 24x7 operational support.
Tools Knowledge: Qradar, Akamai WAF, Azure ATP, DATP, IDP, Vectra, Nmap, Metasploit, Nessus, Burp Suite, OWASP ZAP, Dirb, wireless network pen testing with Aircrack, Wireshark, Network miner.
Thank you
Angu Hari