SURAJ BALARAM GHORPADE
Ph: (M) 9167307939, Email: surajghorpade12@gmail.com DOB- 12th Nov1988
16\404, Mahavir Vatika CHS, Sai Nagar, Old Panvel, Panvel 410206
OBJECTIVE
To develop a career as an Information Security Analyst in a growing company where my skills and experience
will be utilized in achieving the goals and objectives of the organization. Result oriented, Proactive and
industrious Architect with around 14 years’ experience
EXPERIENCE
Tata Consultancy Services:
Senior Solution Architect (2022- Present)
Implementation and POC completed for IBM Qradar, and Splunk.
Use Case deployment, Log source onboarding.
Experience in HLD and LLD.
Functional teams. Work effectively with people of all levels of IT expertise and a wide range of
constituencies, experience, and organizational relationships
Provides support as an information security subject matter expert to department or business units for
relevant business or system processes
The ability to analyze, mitigate and report technical and non-technical risks within the customer’s
computing enclave
Experience with and understanding of compiled and interpreted programs and the types of security
issues possible in each; database systems, web servers, application servers, firewalls, routers, load
balancers, switches, and different types of middleware.
Evaluate IT systems, appliances, and devices being proposed for use within the environment and their
ability to meet security requirements, recommending mitigating controls for identified limitations and
risks
Solution Architect (2018 -2022)
Implementation completed for Google Chronical, Log360.
Implemented Phishing simulation tools knowbe4 and Ironscale.
Implemented Email security tools Proofpoint.
Incident Investigation and Reporting complete Root cause analysis of the information security
incidents to management.
Recommendation of Corrective and Preventive actions post incident analysis
Recommendations for SIEM (HP Arcsight) rule optimization to attenuated false positive incident
reporting.
Delivered process documentation, Assisted in process improvement. resolutions;
Create reports for assigned areas of responsibility; Manage Security Programs; Offer new ideas and
suggestions for improvement.
Creates reports and metric to report to management.
Quick learner, adept in learning new technologies and quickly adapting to new environment;
Demonstrate an ability to analyze issues, expedite innovative solutions and consensus-driven
environment that contributes to on-quality, on-time project delivery; trustworthy, ethical and
discreet.
Working with global Security Team to provide 24 * 7 supports for running effective security
operations.
Troubleshooting technical issues with performance, and overall functioning of the monitoring
infrastructure.
Escalate all issues in time, to the appropriate level, to avoid any adverse impact and reputational risk
on the business.
Project - 1 (2015 – 2018)
We analyze the Clearsky report.
We analyze the Minerva alert evasion technique and Injection prevention.
We analyze Windows DefenderATP alert and take appropriate action as per severity of incident.
Monitor suspicious email reported by user via Ironscales.
Monitor various network incident via Trapx.
Check machine compliance via Mcafee and trend micro office scan.
We are checking suspicious files and URL on Trend Micro DDA.
Monitor various device logs integrated with Arcsight and take appropriate action as directed by client
for various incidents.
Preparing Analysis and trend report for the organization on weekly, Investigates and/or escalates
security violations, attempts to gain unauthorized access, virus infections that may affect the network
or other event affecting security.
Analyzing a reporting Phishing URLs to the respective vendors to get the site down.
Analyze products, systems, projects, and concepts and document their role in the cybersecurity
architecture, tracing their value to business requirements and their effectiveness at supporting
policies
Work with project leads, developers, network engineers, and cybersecurity peers, to design and
maintain a highly secure infrastructure
Communicate the business vision, requirements, policies, physical, and operational elements of
system and security architecture
Communicate technologies, protocols, boundaries, system interfaces, APIs, dependencies,
interactions, and products of and component architecture to audiences including executives and
engineers
Work with experts to identify, document, and track weak points in the architecture based on
standardized methodologies and innovative analysis.
Wipro InfoTech Mumbai (Mar 2012 – Jan 2015) SOC Analyst
One of the Leading Private Sector Bank in India (Information Security Engineer)
Understanding the whole network & requirement of the organization.
Accordingly designing the architecture and plan daily activity schedule for implementation.
Implementation of Symantec Security Information Manager (SIEM Tool) in the organization.
DDoS monitoring
1. Continuous monitoring of DDoS portal of Bharti Airtel & Tata telecommunications
2. L1/L2 investigation & Co-ordination with Network team, Network Security team,
Application/website owner & Bharti Airtel/TCL to validate the traffics
3. If no business requirement, post ISG approval logs ticket at portal to mitigate the traffic.
Ensuring the SLA's are met (SLA's related to Monitoring, Management, Alerting, Reporting)
Analysis Incidents and reporting to management till RCA.
Detecting Phishing and then coordination with ISP to block it.
IPS signature review
Zenith Infotech (July 2010 – Dec 2010) Desktop Support Engineer.
Directed the deployment of operating system updates to 2,000+ workstations, resulting in a 75%
decrease in system vulnerabilities.
Enhanced the customer support portal, cutting down issue resolution time by 25%
Provided timely technical support to staff, improving overall satisfaction rates by 90%
Contributed to the installation of VoIP phones in over 300 office locations
Helped streamline software licensing records, avoiding potential non-compliance fines.
Embee Software Mumbai (Jan 2011 – Mar 2012) Senior Desktop Support Engineer
Streamlined the ticketing process using Jira, leading to a 30% decrease in average response time for IT
support queries
Antivirus installation, OS installation, Asset Management, Hardware Replacement.
Pioneered a remote desktop protocol that improved productivity by allowing 80% of support issues to be
resolved off-site
Designed and delivered training workshops on cybersecurity practices, increasing staff compliance by
95%
TECHNICAL QULIFICATION
Network Technologies Basic Knowledge about Networking Devices Switches, Routers,
Firewalls and IPS.
Virtualization Tools VMware Workstations.
Phishing Response Tool Ironscale, Knowbe4, Proffpoint
SIEM Tools HP Arcsight,Symantec SSIM, IBM Qradar, Splunk, Log 360,
Google Chronicle
Malware Analysis Minerva, Cearsky TrapX, Trend Micro DDA, Windows Defender
ATP, Damware.
ACADEMIC PROFILE
Secondary Education from Maharashtra Board with 58.00% marks.
Higher Secondary from Maharashtra Board with 54% marks
BMS (Bachelor of Management Studies) from Mumbai University with Pass class
Diploma in Hardware and Networking form Jetking institute.
EXTERNAL CERTIFICATION
Certified Ethical Hacker V12
PERSONAL INFORMATION
Father’s Name : Balaram Gangaram Ghorpade
Marital Status : Married
Hobbies : Playing & watching Cricket, Listening Music
Languages Known : English, Hindi and Marathi
DECLARATION
I hereby declare that the above furnished information is true to my knowledge and belief.
Place: Mumbai
Date: Signature