Hello, I am

Prashant Kumar

Result-driven IT security professional understanding of security protocols, cloud Security, risk management, and threat mitigation. Experienced in safeguarding systems, networks, and data against security breaches through preventive and reactive measures, implementing robust security solutions, conducting vulnerability assessments, and responding to incidents swiftly to minimize impact. Skillset in developing strong analytical mindset and behavioural analytics for identification, remediation, containment, and eradication of threats targeting users and company infrastructure. Possessing certificates in CISSP, CISA, and CISM

Download CV

Cyber Security

Information Security

Cloud Security

Network Security

About Me.

Greetings! I'm Prashant Kumar, a passionate Cyber Security Professional and Architect specializing in Network & Cloud defense strategies.
Hello! I'm Prashant Kumar, a passionate Cyber Security Professional and Architect specializing in Network & Cloud defense strategies. With a knack for best practices to mitigate risks across IT, network, and cloud environments. Armed with extensive hands-on experience, focuses on protecting digital information, systems, and infrastructure from unauthorized access, data breaches, and cyber threat. It encompasses a broad range of practices, technologies, and policies to ensure the confidentiality, integrity, and availability (CIA triad) of data. I have experience in key security technologies like Palo Alto NGFW, PAM, and Cloud CSP Azure to secure systems, networks, and data. My architecture skills in Web Application Vulnerability Analysis and Network Traffic Analysis have been instrumental in identifying and mitigating potential threats. I’ve completed over 15 projects in cybersecurity, including a PAM, Email Security , Web Security, and Cloud Security. My expertise in security protocols, risk management, and threat mitigation has been instrumental in safeguarding systems, networks, and data against security breaches. I have a proven track record of implementing robust security solutions, conducting vulnerability assessments, and responding to incidents swiftly to minimize impact. My proactive approach to threat mitigation and incident response has been instrumental in protecting digital assets and ensuring business continuity. I am proficient in developing strong analytical mindset and behavioural analytics for identification, remediation, containment, and eradication of threats targeting users and company infrastructure.

Read More

Work Experience.

Senior Security Specialist

Company: QIB

Duration: Feb. 2017 - Present

  • Core Cybersecurity Skills Development:
    • Deploy and manage security tools like firewalls, antivirus, and intrusion detection/prevention systems IDS/IPS.
  • Tools and Frameworks Proficiency:
    • Engaged with 10+ industry-standard tools such as Kali Linux, Burp Suite, OWASP, CSPM tools, and Recon-ng to simulate real-world cyber-attacks and defenses. Proficient in investigating/troubleshooting IT Server Infrastructure related incidents.
    • Demonstrated proficiency in implementing key frameworks: Mitre Att&CK, NIST, and ITIL processes for threat analysis and detection.
  • Hands-On Project Experience:
    • Crafted an industry-grade project involving penetration testing on an E-Commerce website, utilizing Kali Linux, Burp Suite, and Recon-ng to discover 5 hidden flags and 10 vulnerabilities.
  • Cloud Security:
    • Developed understanding and skills in Microsoft Azure Cloud Hosting, including best practices for securing cloud environments. Familiarized with the security features of 3 major cloud service providers and Web Application Firewalls.
  • Digital Forensics and Future Certifications:
    • Developed skills in digital forensics, contributing to a well-rounded understanding of cybersecurity, and certified in Cybersecurity and Ethical Hacking. Knowledgeable in LAMP based applications and Software Development / Deployment pipelines.

Senior IT Security Engineer

Company: ICT

Duration: June. 2015 – Jan. 2017

  • Project Contributions:
    • Implement endpoint security solutions to protect devices.
  • Operation Contributions:
    • Implement multi-factor authentication (MFA) and identity management solutions.
  • Dashboard and Report Creation:
    • Created 10+ visually compelling dashboards and reports using Tableau and Power BI for stakeholders.

My Skills.

Core Domains:

  • Network Architect
  • Security Perimeter
  • Cloud Security
  • Information Security Policies
  • Risk Management

Databases:

  • MySQL
  • Oracle DB

Web Development:

  • HTML
  • CSS
  • JavaScript

Software Tools:

  • VS Code
  • GitHub
  • MongoDB
  • Microsoft Azure
  • AWS

Clouds CSP

  • Azure
  • GCP
  • AWS
  • OCI

Security Technologies:

  • Firewall
  • Email Security
  • WAF
  • PAM
  • Web Proxy
  • Load Balancer
  • NAC
  • End Point Security
  • DLP
  • Certificate Management
  • DDoS
  • DNS Security

Key Frameworks:

  • Mitre Att&CK
  • NIST
  • ISO27001
  • CIS
  • General Data Protection Regulation (GDPR)

Certifications

CISSP (Certified Information Systems Security Professional)

Issued by: ISc2

Date Issued: February 2023

CISA (Certified Information Systems Auditor)

Issued by: Isaca

Date Issued:04 Apirl 2024

CISM (Certified Information Systems Managerr)

Issued by: Alison

Date Issued: 30 July 2024

Azure Security Engineer Associate

Issued by: Microsofy

Date Issued:20 May 20234

Edureka Cybersecurity and Ethical-Hacking Internship

Issued by: Edureka

Date Issued:10 June 2024

Volunteer : Gambling Awareness Group

Issued by: Sheffield Minds & Univeristy of Sheffield

Date Issued: 10 May 2024

Cyber Security Projects.

Firewall Deployment and Configuration

Vendors: Palo Alto Networks, Cisco, Fortinet, Check Point, Sophos, SonicWall, and Juniper Networks. Deploy and configure firewalls to protect networks from unauthorized access and cyber threats. Proficient in managing and monitoring firewall rules, policies, and security alerts.

Read More

Zero Trust Network Architecture Implementation

Vendors: Zscaler, Akamai, Cloudflare, Palo Alto Networks.

Read More

Multi-Cloud Security Strategy Implementation

Vendors: HashiCorp, Red Hat, VMware.

Read More

Container Security for Kubernetes and Docker

Vendors: Aqua Security, Sysdig, Twistlock Palo Alto.

Read More

Database Management and Security

Proficient in SQL queries and database management, ensuring efficient data organization, retrieval, and manipulation for data-driven decision-making. Conduct assessments of database security configurations and access controls, ensuring data integrity and confidentiality.

Read More

Custom Cybersecurity Solutions

Develop tailored cybersecurity solutions aligned with your organization's unique needs. From secure coding practices to threat modeling and penetration testing, ensure your digital assets remain resilient against cyber threats.

Read More

Full Portfolio.

BERT NLP Project

My Portfolio Summary

IT & Network Security Cloud.

Keylogger Backdoor Project

Introduction

This presentation covers the professional resume and certifications of Prashant Kumar, an experienced IT security professional with a strong focus and key expertise in Information security & cloud security architecture, holding major cyber security certifications CISSP, CISA, and CISM.

Professional Summary

2017- Present : Senior Secuirt Specialist 2015-2017: Senior IT Ssecurity Engineer 2014-2015: security Engineer 2011-2014: Network Administrator- Level2

E-Commerce Penetration Testing

Key Skills

• Cloud Security Expertise • Network Security • Identity and Access Management (IAM) • Compliance and Governance • Automation and Orchestration • Threat Detection and Response • Disaster Recovery and Business Continuity

Linux User Adminsitration Project

Cloud Security Expertise

Key Skills: • Knowledge of cloud platforms: AWS, Azure, GCP. • Securing cloud workloads and data. • Implementing encryption and key management.

Website Information Gathering

IAM

Implementing least privilege access. • Multi-factor authentication (MFA). • Role-based access control (RBAC).

Malware Creation Project

Other skills

Developed malware using FatRat, Metasploitable, and Veil, implementing techniques to bypass antivirus detection and experimenting with phishing, USB drops, and network attacks.

Certifications

CISSP, CISA, CISM, Azure-500

Cloud Security

Executed Cisco Packet Tracer projects, managing packet transmission, data authentication, and server node troubleshooting TCP/IP framework.

Information Security Compliance

Extensive knowledge of compliance regulations such as ISO 27001, NIST, and PCI DSS etc.

Housing Prices Crisis Data Analytics

Network Security Architecture

Technologies and Tools 1. Firewalls 2. Intrusion Detection/Prevention: VPN Solutions 4. SIEM Tools: 5. Cloud Security: 6. OpenSSL, HashiCorp Vault 7. Network Monitoring: 8. Zero-Trust Solutions: 9. Privilege Access Management:

Contact Me!

Address

Al Hitmi, Doha, Qatar

Call Us

+974 7092 5673