Skills
Security Tools & Technologies
SIEM, IDS/IPS, Vulnerability Scanners, Penetration Testing Tools, Cyber Forensics, SOC Operations, Security Monitoring, Incident Response, Vulnerability Management, Risk Assessment, Security Policy Compliance.
Operating Systems
Windows, Linux, macOS.
Networking
TCP/IP, DNS, DHCP, Firewalls.
Analytical Skills
Security Log Analysis, Network Traffic Analysis, Threat Identification, Problem Solving, Data Analysis.
Communication & Collaboration
Stakeholder Communication, Technical Reporting, Recommendations Development.
VIMAL DAVID
Information Security Analyst
No 64 65 vgn mahalakshmi nagar thiruverkadu, 600077, Thiruverkadu Chennai, IN.Work
Chennai, Tamil Nadu, India
→
Summary
Participated in a comprehensive Security Analyst Trainee program, focusing on threat detection, incident response, and vulnerability management to strengthen organizational security posture.
Highlights
Executed comprehensive threat detection and analysis using SIEM tools, identifying and escalating critical security incidents for timely resolution.
Contributed significantly to incident response, vulnerability management, and continuous security monitoring, enhancing proactive defense mechanisms.
Conducted detailed risk assessments and ensured stringent compliance with security policies, strengthening the organization's regulatory posture.
Developed foundational expertise across diverse security tools, operating systems (Windows, Linux, macOS), and networking protocols (TCP/IP, DNS, DHCP, firewalls), enhancing technical proficiency for security operations.
Improved overall security posture by identifying and mitigating various security threats, demonstrating a direct impact on system integrity and data protection.
About
Highly motivated Information Security Analyst with hands-on experience in cyber forensics and Security Operations Center (SOC) operations. Proven ability to leverage SIEM tools for threat detection, conduct thorough risk assessments, and contribute to robust incident response and vulnerability management. Eager to apply expertise in safeguarding information systems, identifying vulnerabilities, and implementing effective security controls to enhance organizational security posture.