Aman Kumar
|
Cybersecurity professional specializing in SOC operations, incident response, EDR monitoring, VAPT coordination, compliance readiness, and enterprise security operations.
500+
Incidents Handled
24/7
SOC Monitoring
99.9%
Threat Detection
Protecting Digital Infrastructure
Defending enterprise systems through proactive monitoring, threat detection, and incident response
Security Officer
CISO Office • HRRL
Dedicated cybersecurity professional operating within the CISO Office, driving Security Operations Center (SOC) excellence through proactive threat monitoring, rapid incident response, and enterprise-wide security governance.
I bring hands-on expertise in EDR analysis with SentinelOne, orchestrating VAPT remediation workflows, and supporting comprehensive internal and external security audits. My work ensures continuous improvement in security posture through detailed MIS reporting and data-driven decision making.
Core competencies include phishing investigation and response, PAM/PIM implementation support, and strengthening enterprise cybersecurity infrastructure through governance initiatives, compliance coordination, and cross-functional collaboration with IT and business teams.
2+
Years in Security
500+
Security Incidents
50+
VAPT Projects
24/7
SOC Coverage
Expertise
Security Skills & Capabilities
SOC Operations
Threat Hunting
SIEM & EDR
Incident Response
Security Governance
Compliance
Network Security
Endpoint Security
OT Security
Vulnerability Management
Tools & Technologies
Experience
Professional Journey
Security Officer
CISO Office • HRRL
Working as a Security Officer in the CISO Office, responsible for enterprise security monitoring, incident response coordination, and maintaining the security posture of critical infrastructure across the organization.
Key Responsibilities
Security Monitoring
24/7 monitoring of enterprise security alerts and events across multiple security tools and platforms.
VAPT Coordination
Coordinating vulnerability assessment and penetration testing remediation efforts across teams.
Audit Support
Supporting both external and internal security audits with documentation and evidence collection.
MIS Reporting
Preparing comprehensive MIS and cybersecurity operational reports for stakeholders.
Phishing Investigation
Handling and investigating phishing incidents, analyzing attack vectors and implementing countermeasures.
PAM/PIM Support
Supporting Privileged Access Management and Privileged Identity Management implementation.
Security Posture
Continuously improving the organization cybersecurity posture through proactive measures.
Governance Activities
Participating in security governance activities and compliance coordination.
Projects
Security Solutions & Tools
A collection of cybersecurity projects focused on enterprise defense, threat detection, and security operations.
A comprehensive Security Operations Center dashboard for real-time threat monitoring, alert correlation, and incident tracking. Features live security metrics, MITRE ATT&CK mapping, and automated alert prioritization.
An automated threat intelligence aggregation platform that collects, analyzes, and correlates IOCs from multiple sources. Provides actionable intelligence for proactive threat hunting.
A governance, risk, and compliance (GRC) tracking system for managing security policies, audit findings, and compliance requirements across frameworks like ISO 27001 and NIST.
An operational technology security monitoring solution designed for industrial control systems. Provides visibility into ICS/SCADA networks with anomaly detection capabilities.
A vulnerability assessment and penetration testing coordination platform. Tracks vulnerability findings, remediation progress, and generates comprehensive security reports.
SOC Dashboard
Security Operations Center
Interactive simulation of an enterprise SOC dashboard with real-time threat monitoring and analytics.
12
Active Threats
47
Resolved Today
4.2m
Avg Response
99.8%
Detection Rate
Threat Severity
Weekly Alert Trend
MITRE ATT&CK Mapping
Live Incident Feed
Certifications
Professional Credentials
Industry-recognized certifications validating expertise in cybersecurity, threat detection, and security operations.
CompTIA Security+
CompTIA
Foundational cybersecurity certification covering network security, compliance, threats, and vulnerabilities.
SC-200
Microsoft
Microsoft Security Operations Analyst certification for threat management using Microsoft security solutions.
CEH - Certified Ethical Hacker
EC-Council
Advanced knowledge of ethical hacking techniques, tools, and methodologies for penetration testing.
Splunk Core Certified User
Splunk
Proficiency in Splunk for searching, reporting, and building dashboards for security monitoring.
Threat Hunting Certification
SANS / Industry
Specialized training in proactive threat hunting methodologies and advanced detection techniques.
IEC 62443
ISA/IEC
Industrial cybersecurity standard for OT/ICS security. Currently pursuing certification.
Contact
Let's Secure Your Infrastructure
Looking for a cybersecurity professional? Let's discuss how I can help protect your enterprise.