Result-driven IT security professional understanding of security protocols, cloud Security, risk management, and threat mitigation. Experienced in safeguarding systems, networks, and data against security breaches through preventive and reactive measures, implementing robust security solutions, conducting vulnerability assessments, and responding to incidents swiftly to minimize impact. Skillset in developing strong analytical mindset and behavioural analytics for identification, remediation, containment, and eradication of threats targeting users and company infrastructure. Possessing certificates in CISSP, CISA, and CISM
Download CV
Greetings! I'm Prashant Kumar, a passionate Cyber Security Professional and Architect specializing in Network & Cloud defense strategies.
Hello! I'm Prashant Kumar, a passionate Cyber Security Professional and Architect specializing in Network & Cloud defense strategies. With a knack for best practices to mitigate risks across IT, network, and cloud environments.
Armed with extensive hands-on experience, focuses on protecting digital information, systems, and infrastructure from unauthorized access, data breaches, and cyber threat. It encompasses a broad range of practices, technologies, and policies to ensure the confidentiality, integrity, and availability (CIA triad) of data. I have experience in key security technologies like Palo Alto NGFW, PAM, and Cloud CSP Azure to secure systems, networks, and data. My architecture skills in Web Application Vulnerability Analysis and Network Traffic Analysis have been instrumental in identifying and mitigating potential threats.
I’ve completed over 15 projects in cybersecurity, including a PAM, Email Security , Web Security, and Cloud Security. My expertise in security protocols, risk management, and threat mitigation has been instrumental in safeguarding systems, networks, and data against security breaches. I have a proven track record of implementing robust security solutions, conducting vulnerability assessments, and responding to incidents swiftly to minimize impact. My proactive approach to threat mitigation and incident response has been instrumental in protecting digital assets and ensuring business continuity. I am proficient in developing strong analytical mindset and behavioural analytics for identification, remediation, containment, and eradication of threats targeting users and company infrastructure.
Company: QIB
Duration: Feb. 2017 - Present
Company: ICT
Duration: June. 2015 – Jan. 2017
Issued by: ISc2
Date Issued: February 2023
Issued by: Isaca
Date Issued:04 Apirl 2024
Issued by: Alison
Date Issued: 30 July 2024
Issued by: Microsofy
Date Issued:20 May 20234
Issued by: Edureka
Date Issued:10 June 2024
Issued by: Sheffield Minds & Univeristy of Sheffield
Date Issued: 10 May 2024
Vendors: Palo Alto Networks, Cisco, Fortinet, Check Point, Sophos, SonicWall, and Juniper Networks. Deploy and configure firewalls to protect networks from unauthorized access and cyber threats. Proficient in managing and monitoring firewall rules, policies, and security alerts.
Read MoreVendors: Zscaler, Akamai, Cloudflare, Palo Alto Networks.
Read MoreVendors: Aqua Security, Sysdig, Twistlock Palo Alto.
Read MoreProficient in SQL queries and database management, ensuring efficient data organization, retrieval, and manipulation for data-driven decision-making. Conduct assessments of database security configurations and access controls, ensuring data integrity and confidentiality.
Read MoreDevelop tailored cybersecurity solutions aligned with your organization's unique needs. From secure coding practices to threat modeling and penetration testing, ensure your digital assets remain resilient against cyber threats.
Read More