Girish Ghadage

Girish Ghadage

Executive IT Admin

Followers of Girish Ghadage118 followers
location of Girish GhadageMumbai, Maharashtra, India

Connect with Girish Ghadage to Send Message

Connect

Connect with Girish Ghadage to Send Message

Connect
  • Timeline

  • About me

    Sr. Cyber Security Analyst at Wipro

  • Education

    • Mumbai University

      2007 - 2008
      B.Sc Computer Science

      in the year April2008.Completed HSC from Mumbai Board with (61.83 %) in the year Feb2005.Completed SSC from Mumbai Board with (72.40%) in the year March2003.

    • Oxford high school

      2004 - 2004
      High School
  • Experience

    • Vakils

      Jan 2010 - Jun 2012
      Executive IT Admin

       Job Responsibilities1. Documentation of IT assets, IT procedures, work instructions and implementing policies for achieving ISO_27001:2005 ISMS certificate.2. Implement, follow-up maintain policies, procedures, log records, of ISO 27001:2005 3. Maintain & follow company’s stated purchase policies.4. Troubleshooting various Infrastructure related issues like Desktop, laptop, printers, office applications related issues.5. Generating & maintaining log reports of servers, antivirus, network printers.6. Responsible for Backup operations of file server. (tool used: SyncBack Pro)7. Installation & support of Mailing Software like MS Outlook, Outlook Express & Mozilla Thunderbird.8. Manage creation/deletion of users on Active directory.9. Manage software Firewall (tool used : Untangle)10. Managing FTP, Email & Web (VPS) Servers. & creating email, ftp accounts on VPS server. (tools used Parallels Plesk panel 9.0 / Smarter mail) Show less

    • CMC LTD

      Apr 2013 - Sept 2015
      Customer Services Executive

       Job Profile• Working on TCS-ICC Project, at TCS client side. Job Responsibilities1. 1. Installation, Configuration and troubleshooting of Lotus notes, Notes traveler.2. Manage Email id Creation/Deletion/Modification/Delegation user Access rights on IBM Lotus Domino Server.3. Manage user id Creation/Deletion/Modification/ on Blackberry Enterprise server.4. Manage Creation/Deletion/Modification of user ids on Active directory.5. Receive & log calls, incident/service requests from end users related to IT infrastructure equipments through email, portal or phone. & provide remote infrastructure management (RIM) support for end user computing to users.6. Logging call & Co-ordinate with service provider, vendors. Track incidents till resolution & call closure as per SLA and prepare follow-up reports for the same. Show less

    • Tata Consultancy Services Limited

      Oct 2015 - Feb 2022
      IT Analyst

      Configuration of Mail Client (Lotus Notes/ O365).Installation and Configuration of server OS like Windows Server 2008, Windows Server 2012.Perform system state backup of AD server.Performing Software Compliance Audits and maintain reports.Performing Asset Inventory on periodical basis and maintaining reports.Server Installation on VMs (Hyper V).Manage creation, deletion, modification of user IDs on Active directory.Laptops Configuration and installation of basic softwareInstallation of Crowd strike EDR, Symantec antivirus and troubleshooting in case of update failures, report collection & applying policies on SEPM.Installation and Configuration of SQL server.Installation, Configuration and Deployment of WDS role.Maintaining compliance of security agents like bluecoat, DLP, DES, AV, Crowd strike EDRCheck compliance of Azure AD joined devices.Create AMIs, Snapshots, Storage Blocks, VPC’s, Subnets and Firewalls in AWS.Troubleshoot the most common problems with AWS instances. Monitor, Alerting and Logging EC2 instances and other AWS services using CloudWatch.Launching AWS EC2 instance as per requirements.Maintaining VPC’s and security Groups.Deploying, managing, and operating scalable, highly available, and fault tolerant systems on AWS.Migrating an existing on-premises application to AWS.Create and Manage DNS entries using Route53 to route traffic between different regions.Implementing AWS Cloud Front for the newly built websites.Implementing AWS Security Groups and NACL (Access control list) for additional Layer of Security.Planning and Implementing Disaster Recovery and Fault for AWS services.Manage Billing across several AWS accounts and optimize resource costs.Create SOPs\Technical notes on AWS and Azure tasks, Best Practice document, check list. Setting up AWS RDS (AZ-Failover and Read replicas).Configure ELB and auto scaling policies.Application Server configuration and deployment Show less

    • Inspira Enterprise

      Feb 2022 - Aug 2022
      Technical Support Specialist

      Project Name : HDFC Bank  Escalation points of L1 for advance troubleshooting. Works with Bank's teams to troubleshoot problem and resolve it. Integrates new endpoints into the platform and do the policy fine tuning. Generates all the reports. Continuous review of Incidents to ensure compliance with standard operating procedures Identify and execute continuous improvements in monitoring including threat scenarios and operating procedures. Carbon Black Agent Rollout, Application whitelisting, App control, Client communication. Status and update. Interact with customers on queries and improvements related to service deliverables. Event Analysis, Identify Trust Threshold of Files Whitelist Accordingly, Banning Files as per client requirement, create custom rule for the Files to Execute  Providing support to application owners in installation of App Control agents at the end points, reduction of False positives in the operations, creating used cases / workflows / playbook. Show less

    • Wipro

      Aug 2022 - now
      Cyber Security Analyst

      Project Name : Sabic (Saudi Basic Industries Corporation) Generate daily reports on logged tickets and RFC’s. Event Analysis, Identify Trust Threshold of Files Whitelist Accordingly, Banning Files as per client requirement on SNOW tickets and RFC’s, create custom rule for the Files to Execute. Providing support to application owners in installation of carbon black App Control agents at the end points. Perform analysis of malicious hashes from virus total and carbon black collective defensive cloud and submit report to corporate cyber security team for banning hashes in environment. Generate weekly reports for non-compliance of all security tools. And follow-up with relevant stakeholders until compliance. Show less

  • Licenses & Certifications