Aaryash Raj Sinha

Aaryash Raj Sinha

Followers of Aaryash Raj Sinha2000 followers
location of Aaryash Raj SinhaUnited States

Connect with Aaryash Raj Sinha to Send Message

Connect

Connect with Aaryash Raj Sinha to Send Message

Connect
  • Timeline

  • About me

    Security Operations & Threat Intelligence • Former Yahoo | Nykaa • Cybersecurity @ University of Maryland • Volunteer at Cybersecurity Conferences and Tech Expos

  • Education

    • University of Petroleum and Energy Studies

      -
      Bachelor of Technology Computer Science Engineering with Specialization in Cloud Computing and Virtualization Technology

      Activities and Societies: Association of Computing Machinery (ACM & ACM-W), Computer Society of India (CSI), Google's Developer Student Club (DSC)

    • Visakha Valley School - India

      -
    • University of Maryland

      -
      Master of Engineering - MEng Cybersecurity

      Activities and Societies: UMDCSEC Teaching Assistant: College of Information Studies • Served the Instructional Support team under Professor Alex Leitch (Co-Director of HCIM program), for the Grad Level Course - Programming for the Information Professional (INST630), at the College of Information Studies at the University of Maryland. Coursework:Semester 1 - Hacking of C programs and Unix Binaries · Cloud Security · Networks and ProtocolsSemester 2 - Security Tools for Information Security · Network Security · Information AssuranceSemester 3 - Digital Forensics and Incident Response · Penetration Testing · Secure Operating SystemsSemester 4 - Advanced Hacking of Linux and Embedded Systems

  • Experience

    • UPES ACM Student Chapter

      Sept 2017 - Aug 2019
      • Design Team Lead

        Feb 2018 - Aug 2019
      • Android Application Development Core Committee

        Sept 2017 - Sept 2018
    • Sysadmin Academy Chennai

      May 2019 - Jul 2019
      Linux System Administrator Trainee

      Proficient in Red Hat Certified System Administration and Red Hat Certified Engineer.

    • Codec Networks Pvt Ltd

      Jan 2020 - Feb 2020
      Information and Cyber Security
    • Hacking Articles

      Jan 2020 - Feb 2020
      Technical Writer

      • Authored cybersecurity research articles, focusing on ethical hacking, computer forensics, and penetration testing.• Developed detailed guides and tutorials, for information security professionals in cybersecurity and penetration testing.

    • Haryana Police

      Apr 2020 - May 2020
      Summer Research Intern

      A thorough training on domains such as Social Media Crimes and Investigation, Email Crimes and Investigation, VoIP and VoWi-Fi Crimes and Investigation, E-Commerce Frauds and Investigation, Website Hacking and investigation, was provided over the course of 2 months by 13 reputed Cyber and Law experts from the CBI, Cyber Crime Cell and the Cyber Security Industry.Researched and Developed a Malware based Project:• The main aim of this project was to create an executable file in a different extension format(.jpg/.pdf/.mp4/..), which is to be planted on a Target Windows machine.• When the user of the target machine clicks on the planted file(even by mistake), a connection will be established on the Hacker's machine which will provide a running Shell of the target machine and give its entire access.• Apart from the user's priveleges, a Keylogger file can be executed from the Hacker's machine anytime, to capture any and all the keystrokes from the target machine's keyboard. Show less

    • Information Sharing And Analysis Center

      May 2020 - Aug 2020
      Digital Forensics Intern

      • Performed regular system and network assessments with Volatility3 and LiME to detect vulnerabilities as part of the OpenCTI team, enhancing the evaluation, testing, and integration of new security controls• Employed IDA Pro for comprehensive threat assessments, contributing to technical analysis and effective problem resolution

    • Nykaa

      Aug 2021 - Aug 2022
      Associate Security Operations Analyst

      Task performed for Screening:• Configured an EC2 Linux Instance and Set up a WordPress Blog site through a LEMP Server (Linux, Nginx, MySQL, PHP) and secured the instance by performing a Full Server and OS Hardening with a Final Score of 95.Job Role: The primary objective was to support the team in the delivery of managed security services. Therole required me to Assess, Monitor, and Manage the 24*7 running resources across differentphysical/virtual locations, to ensure smooth functioning of the E-Commerce platforms.List of tasks performed:• Worked on Crowdstrike Falcon EDR Console to monitor and mitigate vulnerabilities, threats and incidents and malware observed across all endpoints in the organisation• Performed the vulnerability assessments of the entire Infrastructural Domain (On-Prem Servers, DVR & IP Cameras, Firewall, Networking Devices, Warehouses), with assistance from the team, as a part of weekly sprints• Managed the mass-deployment of Crowdstrike Falcon Sensors across all Windows, Mac and Linux workstations (1500+) throughout the organisation• Worked on Grafana, BigIP and BigIQ for keeping the E-Commerce Platform attack free during the times of Sale• Documented and maintained the Testing data for termination of the Open Issues, for the IT-Team.• Worked on Dome9 Posture Management of all existing Cloud Services and reported the findings to the team bi-weeklyTools Exposed To:• Crowdstrike Falcon for Endpoint Detection and Response• Grafana Analytics Tool for Real-time Response Monitoring• Nessus Professional for Vulnerability Assessment and Testing• Cloudguard Dome9 for Cloud Security Posture Management• BigIP & BigIQ for DoS Attack Monitoring and Mitigation• Mimecast for DLP and Email Security Show less

    • Yahoo

      May 2023 - Aug 2023
      Forensics and Incident Response Operations Analyst

      • Monitored and analyzed security events in a 24x7 SOC team, utilizing tools like Splunk, Swimlane IBM QRadar, and SentinelOne to enhance threat detection.• Responded to potential threats with threat hunters, tracking suspicious network activity using network analysis tools like Arkime and Zeek.• Managed incident workflows with ServiceNow and Jira, automating response processes with Swimlane SOAR for increased efficiency.• Investigated anomalous event data, reported malicious emails, suspicious domains, and other IOAs/IOCs on a weekly basis.• Planned and performed investigation and evidence collection by identifying malware IOCs on endpoints.• Proactively identified and mitigated false positives by working with senior analysts to suppress noisy detections.• Collaborated with level 2+ analysts to review security incidents and assist with detection, prevention, and mitigation of incidents. Show less

    • KC7 Foundation

      Nov 2023 - Jan 2025
      Threat Intel Content Analyst

      • Tracked APT actors and TTPs using OSINT to enhance threat intelligence.• Developed risk profiles for APT Groups using MITRE ATT&CK framework.• Utilized ADX and KQL to analyze security logs for threat detection.• Automated threat log generation through YAML configuration files and Python scripts.

    • DOT Security

      Feb 2025 - now
      Core Cybersescurity Analyst

      • Monitored and analyzed SIEM alerts to identify suspicious activity, correlating network traffic and logs to detect potential security incidents in real time.• Investigated and responded to phishing attacks by analyzing email headers, extracting indicators of compromise (IOCs), and coordinating mitigation efforts with internal teams.• Tuned security tools by refining SIEM rule sets and adjusting alert thresholds, reducing false positives and improving detection accuracy for real threats.• Performed forensic analysis on security incidents by reviewing packet captures and system logs to determine root cause and recommend preventive measures. Show less

  • Licenses & Certifications

    • Intro to Splunk

      Splunk
      May 2023
    • Visualizaitons

      Splunk
      May 2023
    • Certified Appsec Practitioner

      The SecOps Group
      Feb 2024
    • Certified Ethical Hacker (CEH)

      EC-Council
      Feb 2020
    • Using Fields

      Splunk
      Apr 2023
    • Intro to Dashboards

      Splunk
      Apr 2023
    • SOC Core Skills with John Strand

      Black Hills Information Security
      Feb 2024
  • Volunteer Experience

    • Local Guide

      Issued by Google
      GoogleAssociated with Aaryash Raj Sinha
    • Speaker Liasion

      Issued by CYBERWARCON on Nov 2023
      CYBERWARCONAssociated with Aaryash Raj Sinha
    • Blue Team Village - Organizing Team

      Issued by DEF CON on Aug 2023
      DEF CONAssociated with Aaryash Raj Sinha
    • Volunteer

      Issued by BSidesNoVA on Sept 2023
      BSidesNoVAAssociated with Aaryash Raj Sinha
    • Event Staff

      Issued by SXSW on Mar 2024
      SXSWAssociated with Aaryash Raj Sinha