In the suburban tranquility of Kalyan, there resides Sarthak Javeri. His days are a symphony of vigilance and dedication, each moment dedicated to protecting the digital realms against unseen threats.

Strategy

Security Enhancement, Encryption

Employee

Sarthak Javeri

The IT Security Analyst arrives at the office 15 minutes before his shift begins. This allows him to take over seamlessly from his counterpart in the previous shift and review the handover notes.

The Analyst officially starts his shift by checking the handover from the previous shift. He reviews any ongoing alerts or issues that need immediate attention.

The Analyst follows up on any unresolved tickets and alerts handed over from the previous shift. He ensures that all ongoing security incidents are being addressed and documents any progress made.

The Analyst begins monitoring security alerts using the SIEM tool and IPS/IDS solutions and EDR tools. His role involves identifying, investigating, and responding to security alerts as they appear.

Upon identifying an alert, the Analyst conducts a thorough investigation. He reviews the alert details, assesses the threat level, and determines the appropriate response. If necessary, he escalates the issue to the relevant support team.

He also works on monthly patching, uses patching tool and applications to monitor the patching status of all Windows-based systems, addressing any patch failures by redeploying patches or escalating as needed.

As the first past of the day ends, the analyst takes a short break to refresh and prepare for the next set of tasks.

The Analyst reviews vulnerability reports from vulnerability assessment tools. He parses through these reports to identify any critical vulnerability and escalate it to Patch admin.

The Analyst checks the status of firewall and ensures all devices are functioning correctly (healthy state).

The Analyst used multiple tools such SIEM, Check point, Firewall to investigates any anomalies and takes necessary actions to mitigate risks.

The Analyst documents top 5 users for account lockout and failed authentication and escalate the same to HQ team.

The Analyst verifies the containment functionality of tools like IPS, EDR and MFA. He resumes his routine, monitoring alerts from all the tools. He ensures any identified threats are promptly addressed. He reviews tools like VA and PT for any active scans. He identifies any areas of concern and takes proactive measures to enhance security.

In the second half of the day, the Analyst takes a short break to relax and prepare for the final tasks of his shift.

The Analyst conducts a check, using phishing tools to identify any phishing email reported by user. He ensures all emails are sandboxed and categorized as clean.

The Analyst prepares detailed notes for the handover to the next shift. He summarizes all activities, alerts, and any critical issues that need immediate attention to ensure a seamless transition.

Final monitoring and checks are conducted to ensure no issues are left unresolved.

The Analyst finalizes the handover, ensuring the next shift is fully briefed on the current status of all systems and any ongoing issues. This ensures continuous monitoring and security coverage.

The Analyst shift officially ends, and he hands over his duties to the next team, ensuring they are well-prepared to continue monitoring and addressing any security alerts.

The Analyst shift officially ends, and he hands over his duties to the next team, ensuring they are well-prepared to continue monitoring and addressing any security alerts.

In the suburban tranquility of Kalyan, there resides Sarthak Javeri. His days are a symphony of vigilance and dedication, each moment dedicated to protecting the digital realms against unseen threats.

Strategy

Security Enhancement, Encryption

Employee

Sarthak Javeri

Foodetective mobile application: onboarding

As the sun rises, Sarthak emerges from the quiet embrace of dawn, his mind already buzzing with anticipation. With a steaming cup of chai in hand, he immerses himself in the latest cybersecurity forums, absorbing every nugget of information like a sponge.

Arriving at his workstation, Sarthak’s focus sharpens. The blinking lights of his monitors cast a light glow as he sifts through a cascade of security alerts. Each blip on the screen is a potential breach, a puzzle to be solved with meticulous analysis and swift action.

Throughout the day, Sarthak’s duties extend far beyond mere monitoring. He delves into the depths of network traffic analysis, his keen eye catching even the subtlest anomalies amidst the sea of data. Ticket requests flood his inbox, each one demanding his attention and expertise.

And as the day draws to a close, Sarthak rests easy, secure in the knowledge that he’s done his part to keep the digital world safe and sound. In the quiet suburbs of Kalyan, amidst the flickering glow of monitors and the hum of servers, Sarthak Javeri stands as an experienced IT security professional uncovering the ever-evolving landscape of cybersecurity.

Sarthak’s role as a guardian of IT security offers the exhilarating challenge of outsmarting unseen threats while ensuring the safety and security of the online world.