AMAN KUMAR
Initializing Security Systems...
Security Operations Analyst

Aman Kumar

|

Cybersecurity professional specializing in SOC operations, incident response, EDR monitoring, VAPT coordination, compliance readiness, and enterprise security operations.

500+

Incidents Handled

24/7

SOC Monitoring

99.9%

Threat Detection

Scroll
Security Operations

Protecting Digital Infrastructure

Defending enterprise systems through proactive monitoring, threat detection, and incident response

Security Officer

CISO Office • HRRL

Dedicated cybersecurity professional operating within the CISO Office, driving Security Operations Center (SOC) excellence through proactive threat monitoring, rapid incident response, and enterprise-wide security governance.

I bring hands-on expertise in EDR analysis with SentinelOne, orchestrating VAPT remediation workflows, and supporting comprehensive internal and external security audits. My work ensures continuous improvement in security posture through detailed MIS reporting and data-driven decision making.

Core competencies include phishing investigation and response, PAM/PIM implementation support, and strengthening enterprise cybersecurity infrastructure through governance initiatives, compliance coordination, and cross-functional collaboration with IT and business teams.

SOC Monitoring
Incident Response
Threat Hunting
EDR Analysis
PAM/PIM
Security Governance
VAPT Coordination
Phishing Investigation

2+

Years in Security

500+

Security Incidents

50+

VAPT Projects

24/7

SOC Coverage

Expertise

Security Skills & Capabilities

SOC Operations

90%
24/7 MonitoringAlert TriageLog AnalysisSecurity CorrelationReal-time Detection

Threat Hunting

85%
IOC AnalysisBehavioral AnalysisMITRE ATT&CKThreat IntelligenceProactive Detection

SIEM & EDR

88%
SentinelOneSplunkMicrosoft DefenderLog CorrelationAlert Management

Incident Response

87%
ContainmentEradicationRecoveryPost-Incident AnalysisPlaybook Execution

Security Governance

82%
Policy DevelopmentRisk AssessmentComplianceSecurity FrameworksDocumentation

Compliance

80%
ISO 27001NISTAudit PreparationGap AnalysisRemediation Tracking

Network Security

83%
Firewall ManagementVPN SecurityNetwork MonitoringTraffic AnalysisSegmentation

Endpoint Security

86%
EDR DeploymentEndpoint HardeningPatch ManagementDevice ControlAV Management

OT Security

75%
ICS/SCADAIEC 62443OT Network MonitoringIndustrial ProtocolsAsset Discovery

Vulnerability Management

84%
VAPT CoordinationVulnerability AssessmentRemediation TrackingRisk PrioritizationScanning

Tools & Technologies

SentinelOneSplunkMicrosoft DefenderPAM/PIMFirewallsSIEMEDRVPN SecurityActive DirectoryWireshark

Experience

Professional Journey

Security Officer

CISO Office • HRRL

Current Position

Working as a Security Officer in the CISO Office, responsible for enterprise security monitoring, incident response coordination, and maintaining the security posture of critical infrastructure across the organization.

SOC OperationsIncident ResponseEDR MonitoringThreat HuntingComplianceVAPT

Key Responsibilities

Security Monitoring

24/7 monitoring of enterprise security alerts and events across multiple security tools and platforms.

VAPT Coordination

Coordinating vulnerability assessment and penetration testing remediation efforts across teams.

Audit Support

Supporting both external and internal security audits with documentation and evidence collection.

MIS Reporting

Preparing comprehensive MIS and cybersecurity operational reports for stakeholders.

Phishing Investigation

Handling and investigating phishing incidents, analyzing attack vectors and implementing countermeasures.

PAM/PIM Support

Supporting Privileged Access Management and Privileged Identity Management implementation.

Security Posture

Continuously improving the organization cybersecurity posture through proactive measures.

Governance Activities

Participating in security governance activities and compliance coordination.

Projects

Security Solutions & Tools

A collection of cybersecurity projects focused on enterprise defense, threat detection, and security operations.

Enterprise SOC Dashboard

A comprehensive Security Operations Center dashboard for real-time threat monitoring, alert correlation, and incident tracking. Features live security metrics, MITRE ATT&CK mapping, and automated alert prioritization.

Real-time MonitoringAlert CorrelationIncident TrackingMITRE Mapping
ReactNode.jsSplunk APID3.jsWebSocket

Threat Intelligence Platform

An automated threat intelligence aggregation platform that collects, analyzes, and correlates IOCs from multiple sources. Provides actionable intelligence for proactive threat hunting.

IOC AggregationThreat FeedsAutomated AnalysisAPI Integration
PythonFastAPIPostgreSQLRedisMachine Learning

Cybersecurity Governance Tracker

A governance, risk, and compliance (GRC) tracking system for managing security policies, audit findings, and compliance requirements across frameworks like ISO 27001 and NIST.

Policy ManagementAudit TrackingCompliance DashboardRisk Assessment
Next.jsTypeScriptPrismaPostgreSQLTailwind

OT Security Monitoring System

An operational technology security monitoring solution designed for industrial control systems. Provides visibility into ICS/SCADA networks with anomaly detection capabilities.

ICS MonitoringAnomaly DetectionAsset DiscoveryProtocol Analysis
PythonKafkaInfluxDBGrafanaDocker

VAPT Tracking Dashboard

A vulnerability assessment and penetration testing coordination platform. Tracks vulnerability findings, remediation progress, and generates comprehensive security reports.

Vulnerability TrackingRemediation WorkflowRisk ScoringReport Generation
ReactExpressMongoDBChart.jsPDF Generation

SOC Dashboard

Security Operations Center

Interactive simulation of an enterprise SOC dashboard with real-time threat monitoring and analytics.

+2

12

Active Threats

+8

47

Resolved Today

-0.5m

4.2m

Avg Response

+0.2%

99.8%

Detection Rate

Threat Severity

Critical
High
Medium
Low

Weekly Alert Trend

MITRE ATT&CK Mapping

Live Incident Feed

INC-2024-0012m ago
PhishingHigh
Investigating
INC-2024-00215m ago
MalwareCritical
Contained
INC-2024-00332m ago
Brute ForceMedium
Monitoring
INC-2024-0041h ago
Data ExfilHigh
Investigating

Certifications

Professional Credentials

Industry-recognized certifications validating expertise in cybersecurity, threat detection, and security operations.

🛡️

CompTIA Security+

CompTIA

Active

Foundational cybersecurity certification covering network security, compliance, threats, and vulnerabilities.

🔷

SC-200

Microsoft

Active

Microsoft Security Operations Analyst certification for threat management using Microsoft security solutions.

🎯

CEH - Certified Ethical Hacker

EC-Council

Active

Advanced knowledge of ethical hacking techniques, tools, and methodologies for penetration testing.

📊

Splunk Core Certified User

Splunk

Active

Proficiency in Splunk for searching, reporting, and building dashboards for security monitoring.

🔍

Threat Hunting Certification

SANS / Industry

Active

Specialized training in proactive threat hunting methodologies and advanced detection techniques.

🏭

IEC 62443

ISA/IEC

Planned

Industrial cybersecurity standard for OT/ICS security. Currently pursuing certification.

All certifications can be verified upon request

Contact

Let's Secure Your Infrastructure

Looking for a cybersecurity professional? Let's discuss how I can help protect your enterprise.

Send Email
or send a message