KRINA PATEL
Open, to full-time, and Great Cybersecurity Roles in CANADA
π΅οΈTryHackMe: Access account !
Iβm a cybersecurity analyst with over 2 years of hands-on experience in security operations, incident response, and log analysis. At Insignia Technolabs, I reduced SIEM false positives by 50% and improved firewall efficiency by 30%. While working with Amazon, I contributed to a 35% reduction in endpoint vulnerabilities through patching and hardening. My work in malware analysis, phishing detection, and SOC lab simulations has strengthened detection accuracy by 40% and response time by 20%, using tools like Splunk, Snort, Nessus, and Microsoft Sentinel.
π Location: Ontario, Canada
βοΈ Email: [email protected]
π‘ Core Skills
π Log Analysis | SIEM (Splunk, Sumo Logic, Sentinel)
π¦ Malware Analysis | Threat Intel | MITRE ATT&CK
π¨ Incident Detection & Response | NIST CSF
π Network & Cloud Security | Firewall, IDS/IPS, VPN
π₯οΈ Endpoint Security (CrowdStrike, Sophos, Symantec)
π§° Tools: Nessus, Wireshark, Anyrun, ServiceNow, Power BI
πΌ Experience Highlights
IT Support Analyst β Amazon (2024βPresent)
Cybersecurity Analyst β Riskstifle Mentorship (2024β25)
Jun. Security Analyst β Insignia Technolabs (2022β24)
π¬ Projects
π§ͺ SOC Home Lab β Splunk, Snort, Wireshark
Developed a SOC home lab using Splunk, Snort, and Wireshark for real-time alerting and traffic analysis.
π‘οΈ pfSense Firewall + Snort + OpenVPN Setup
Implemented a secure network architecture using pfSense, Snort, and OpenVPN with integrated AD and RADIUS authentication.
π΅οΈ TryHackMe Labs β Malware & Phishing Analysis
Completed multiple TryHackMe labs focusing on malware, phishing, and network forensics.
π Incident Response Playbooks β Aligned with NIST
Created and tested Incident Response Playbooks aligned with NIST guidelines for malware and phishing scenarios.