Digital Forensics Researcher | Threat Intelligence | Threat Hunting | Insider Threat Researcher
Rohit D Sadgune :- The rapid growth of technology use like Internet, mobile devices etc. and new business processes has made Information security one of the most important issues faced by organizations today. This can expose companies to different type of risk so the company needs to be vigilant all the time. Organizations exposed to such risk which will have devastating effects like losing market share and stretched litigation etc. I am accomplished at providing a high level of customer service. I have significant experience in the information security field. In addition, I have completed several certifications in Information Security, Fraud and Digital Forensics. I have experience in IT Security domain which includes SIEM implementation, performing POC (proof of concepts) for prospect customers & use case configuration, Vulnerability Assessment Penetration Testing, Digital Forensics and Incident Response I excel at developing documentation, training materials, policies and procedures. Principle industry which I served till today’s dates are in the domain of IT Security/ Cyber Forensics.
Information Security: – I have done Vulnerability Assessment & Penetration Testing of more than 500 web applications & network assessment over 1000 IPs. Implementation of endpoint protection system & investigation of multiple projects for security stream line. Implementation of Security Event Incident Management system & Incident Response.
Core Competencies
Threat Intelligence | Insider Threat Detection | User Behavior Analytics |
Activity Account Monitoring | Incident Response & Management | Fraud Investigation |
Cyber Threat Management | Threat Intelligence | Data Security Intelligence |
Cloud Security Intelligence | Application Security Intelligence | Anomaly & Pattern Detection |
Identity & Access Management | Vulnerability Assessment | Fraud Investigation |
Security And Forensics Product Implementation | Security Information Event Monitoring | Digital Forensics |
Data Recovery | Malware Investigation | Packet Forensics |
Certification
RHCE | REDHAT CERTIFIED ENGINEER |
CCI | CERTIFIED CYBER CRIME INVESTIGATOR |
CEH | CERTIFIED ETHICAL HACKER |
CHFI | CERTIFIED HACKING FORENSICS INVESTIGATOR |
CPH | CERTIFIED PROFFESSIONAL HACKER |
CPFA | CERTIFIED PROFFESSIONAL FORENSICS INVESTIGATOR |
CPS | CERTFIED PROXY SOLUTIONS |
CFS | CERTIFIED FIREWALL SOLUTION |
CNMS | CERTIFIED NETWORK MONITORING SOLUTION |
Technology Used
Threat & SIEM | Risk Threat Intelligence, Next Gen SIEM + UEBA, Alienvault (Security Information & Event Management) , MacAfee endpoint protection (Complete Suit) |
Forensics Software | EnCase 7.08 , ProDiscover (IR & Forensics Edition), MobiEdit Forensics 7.5, X-ways Forensics, dtSearch 7, ConnectQ, Passware forensics kit, ElcomSoft, Internet Evidence Finder , OSForensics. |
Linux Forensics | SPADA Linux, DEFT, SWIFT, CAIN |
Digital Forensics Hardware | ICS Super Kit, ICS IM solo4 , ICS SDL , Tabelu write protestor, WibeTech, Forensics Workstation. |
Vulnerability Assessment | HP WebInspect, IBM App Scan, Acunetix, Nessus, OpenVAS, Havij, W3f Auditor, Web Indexers , Checkmarx (statci source code analysis) |
Information Security Expertise
Digital Forensics | Vulnerability Assessment & Penetration Testing | SIEM + User Behavior Analytics |