Top Talent like Sachin are on Pangea

Pangea, a YC company, connects companies with fractional talent. Fractional hiring allows companies to move faster and work with more specilaized talent, while giving talent more flexibilty and independence. If you are talent open to fractional work, apply here. If you’re a company looking for high-quality fractional talent, learn more here.

Sachin Khandgond

Customer Success ManagerHyderabad, TS, IN
Cybersecurity
Cybersecurity frameworks
Data Cleaning
Data Analysis
IT Support
Available for hire fromNegotiable
Contracts
Full-Time Roles
"Experienced SOC Analyst with 2.5 Years of Experience in Threat Detection, Incident Response, and Security Monitoring"
I'm [Sachin Khandgond], an experienced SOC Analyst with a strong analytical skillset and technical expertise in using SIEM tools such as Splunk, IBM QRadar, and ArcSight. With excellent communication and collaboration skills, I have a proven track record of identifying and mitigating security threats, and I am committed to staying up-to-date with the latest industry trends and best practices.

Projects

Title: Malware Analysis and Remediation Project

Objective: To analyze and remediate a real-world malware attack in a simulated environment, and implement measures to prevent similar attacks in the future. Project Description: Identify malware: Choose a malware sample that represents a real threat to the organization. This can be done by researching recent malware attacks, or by using a public malware repository. Create a simulated environment: Create a simulated environment in which to analyze the malware. This should include a virtual machine or sandbox, as well as any necessary network configurations. Analyze the malware: Run the malware in the simulated environment and analyze its behavior. Use tools such as IDA Pro, OllyDbg, or other disassemblers to reverse engineer the code and identify its capabilities. Document findings: Document the findings of the malware analysis. This should include information such as the malware's attack vector, persistence mechanisms, and any other notable characteristics. Develop remediation plan: Based on the findings of the analysis, develop a plan for remediating the malware attack. This should include steps for removing the malware from infected systems, as well as measures for preventing similar attacks in the future. Implement remediation measures: Implement the remediation plan, and test it to ensure it is effective. Document and train: Document the remediation measures and procedures for implementing them. Provide training to relevant staff on how to implement the measures, and ensure they are aware of the risks associated with malware attacks. Outcome: The outcome of this project will be an improved ability to analyze and remediate malware attacks, as well as improved measures for preventing future attacks. The project will provide an opportunity to develop and apply skills in malware analysis and incident response, as well as gain experience in implementing and managing security measures to prevent and remedySee More

Work History

N

SOC Analyst L-1

Nexamatic Software Solutions Pvt Ltd•Manage 24x7 operations at SOC including event monitoring which includes incident detection, tracking and analyzing on a real-time basis, and report generation. •Daily monitoring of Dashboards and alerts in Splunk & analyzing the Triggered Alerts. •Analyze the log activities from Splunk and respond to the incidents from the console. •Analyze suspicious IPs, file hashes, and URLs using Threat Intelligence to detect types of malware using Virustotal.com, MxToolBox.com, hybrid analysis.com, IBM X-Force, CISCO Talos, IP Void, and IP Abuse. •Good command of Splunk components. •Knowledge of OSI-model and cyber kill chain. •Knowledge & good understanding of Network Ports and Protocols, DNS, DHCP, Proxy, VPN, etc. •Strong knowledge of security concepts like CIA, RISK, Vulnerability, Threat, and Defense In Depth. •Having a good knowledge of Network Devices & Network security devices. •Prepare Weekly and monthly incident reports. •Review incident creation, and validate closed Incidents, and take follow-up opening incidents. •Assist senior analysts in Fine-tuning – filtering SIEM alerts to ensure only relevant security data is gathered and moved default rules to production after rule analysis. •Assist in development and knowledge sharing with the team. •Resolve problems independently and understand escalation procedures.

How Pangea Works

Effortlessly discover top talent

We’ve distilled the candidate search from endless hours down to just a few minutes. Using Pangea’s AI-powered search tools, you can find top fractional talent able to take on your next project. Our system looks at your company’s niche and your needs to find the perfect match faster than any traditional hiring platform.

Start working with talent today

The top talent on Pangea is ready to get started with you right now. You can message or hire a candidate right from their profile page and start assigning work as soon as they respond. And the best part? Pangea’s fractional contract structure lets you start small and ramp up as your needs change, keeping your costs manageable and your team’s capabliities flexible.

Track work and invoices in one place

Assign tasks, track progress, and complete invoices all on Pangea. We’ve combined every part of the hiring process into one platform to eliminate the miscommunication that’s unavoidable on other freelance platforms. We even send out 1099s to your contractors at the end of the year!

Talk with a Talent Expert

Members of our team are available to help you speed through the hiring process.
Available Now
Book a Call
"Experienced SOC Analyst with 2.5 Years of Experience in Threat Detection, Incident Response, and Security Monitoring"
I'm [Sachin Khandgond], an experienced SOC Analyst with a strong analytical skillset and technical expertise in using SIEM tools such as Splunk, IBM QRadar, and ArcSight. With excellent communication and collaboration skills, I have a proven track record of identifying and mitigating security threats, and I am committed to staying up-to-date with the latest industry trends and best practices.

Talk with a Talent Expert

Members of our team are available to help you speed through the hiring process.
Available Now
Book a Call

Top Talent like Sachin are on Pangea

Pangea, a YC company, connects companies with fractional talent. Fractional hiring allows companies to move faster and work with more specilaized talent, while giving talent more flexibilty and independence. If you are talent open to fractional work, apply here. If you’re a company looking for high-quality fractional talent, learn more here.

Sachin Khandgond

Customer Success ManagerHyderabad, TS, IN
Cybersecurity
Cybersecurity frameworks
Data Cleaning
Data Analysis
IT Support
Available for hire fromNegotiable
Contracts
Full-Time Roles

Projects

Title: Malware Analysis and Remediation Project

Objective: To analyze and remediate a real-world malware attack in a simulated environment, and implement measures to prevent similar attacks in the future. Project Description: Identify malware: Choose a malware sample that represents a real threat to the organization. This can be done by researching recent malware attacks, or by using a public malware repository. Create a simulated environment: Create a simulated environment in which to analyze the malware. This should include a virtual machine or sandbox, as well as any necessary network configurations. Analyze the malware: Run the malware in the simulated environment and analyze its behavior. Use tools such as IDA Pro, OllyDbg, or other disassemblers to reverse engineer the code and identify its capabilities. Document findings: Document the findings of the malware analysis. This should include information such as the malware's attack vector, persistence mechanisms, and any other notable characteristics. Develop remediation plan: Based on the findings of the analysis, develop a plan for remediating the malware attack. This should include steps for removing the malware from infected systems, as well as measures for preventing similar attacks in the future. Implement remediation measures: Implement the remediation plan, and test it to ensure it is effective. Document and train: Document the remediation measures and procedures for implementing them. Provide training to relevant staff on how to implement the measures, and ensure they are aware of the risks associated with malware attacks. Outcome: The outcome of this project will be an improved ability to analyze and remediate malware attacks, as well as improved measures for preventing future attacks. The project will provide an opportunity to develop and apply skills in malware analysis and incident response, as well as gain experience in implementing and managing security measures to prevent and remedy

Work History

N

SOC Analyst L-1

Nexamatic Software Solutions Pvt Ltd•Manage 24x7 operations at SOC including event monitoring which includes incident detection, tracking and analyzing on a real-time basis, and report generation. •Daily monitoring of Dashboards and alerts in Splunk & analyzing the Triggered Alerts. •Analyze the log activities from Splunk and respond to the incidents from the console. •Analyze suspicious IPs, file hashes, and URLs using Threat Intelligence to detect types of malware using Virustotal.com, MxToolBox.com, hybrid analysis.com, IBM X-Force, CISCO Talos, IP Void, and IP Abuse. •Good command of Splunk components. •Knowledge of OSI-model and cyber kill chain. •Knowledge & good understanding of Network Ports and Protocols, DNS, DHCP, Proxy, VPN, etc. •Strong knowledge of security concepts like CIA, RISK, Vulnerability, Threat, and Defense In Depth. •Having a good knowledge of Network Devices & Network security devices. •Prepare Weekly and monthly incident reports. •Review incident creation, and validate closed Incidents, and take follow-up opening incidents. •Assist senior analysts in Fine-tuning – filtering SIEM alerts to ensure only relevant security data is gathered and moved default rules to production after rule analysis. •Assist in development and knowledge sharing with the team. •Resolve problems independently and understand escalation procedures.

How Pangea Works

Effortlessly discover top talent

We’ve distilled the candidate search from endless hours down to just a few minutes. Using Pangea’s AI-powered search tools, you can find top fractional talent able to take on your next project. Our system looks at your company’s niche and your needs to find the perfect match faster than any traditional hiring platform.

Start working with talent today

The top talent on Pangea is ready to get started with you right now. You can message or hire a candidate right from their profile page and start assigning work as soon as they respond. And the best part? Pangea’s fractional contract structure lets you start small and ramp up as your needs change, keeping your costs manageable and your team’s capabliities flexible.

Track work and invoices in one place

Assign tasks, track progress, and complete invoices all on Pangea. We’ve combined every part of the hiring process into one platform to eliminate the miscommunication that’s unavoidable on other freelance platforms. We even send out 1099s to your contractors at the end of the year!

Talk with a Talent Expert

Members of our team are available to help you speed through the hiring process.
Available Now
Book a Call
Pangea empowers fractional work across the world for marketing and design roles.