KRINA PATEL

Open, to full-time, and Great Cybersecurity Roles in CANADA

Hire me

πŸ•΅οΈTryHackMe: Access account !

I’m a cybersecurity analyst with over 2 years of hands-on experience in security operations, incident response, and log analysis. At Insignia Technolabs, I reduced SIEM false positives by 50% and improved firewall efficiency by 30%. While working with Amazon, I contributed to a 35% reduction in endpoint vulnerabilities through patching and hardening. My work in malware analysis, phishing detection, and SOC lab simulations has strengthened detection accuracy by 40% and response time by 20%, using tools like Splunk, Snort, Nessus, and Microsoft Sentinel.

πŸ“ Location: Ontario, Canada
βœ‰οΈ Email: [email protected]

πŸ’‘ Core Skills

πŸ” Log Analysis | SIEM (Splunk, Sumo Logic, Sentinel)
🦠 Malware Analysis | Threat Intel | MITRE ATT&CK
🚨 Incident Detection & Response | NIST CSF
🌐 Network & Cloud Security | Firewall, IDS/IPS, VPN
πŸ–₯️ Endpoint Security (CrowdStrike, Sophos, Symantec)
🧰 Tools: Nessus, Wireshark, Anyrun, ServiceNow, Power BI

πŸ’Ό Experience Highlights

IT Support Analyst – Amazon (2024–Present)
Cybersecurity Analyst – Riskstifle Mentorship (2024–25)
Jun. Security Analyst – Insignia Technolabs (2022–24)

πŸ”¬ Projects

πŸ§ͺ SOC Home Lab – Splunk, Snort, Wireshark

Developed a SOC home lab using Splunk, Snort, and Wireshark for real-time alerting and traffic analysis.

πŸ›‘οΈ pfSense Firewall + Snort + OpenVPN Setup

Implemented a secure network architecture using pfSense, Snort, and OpenVPN with integrated AD and RADIUS authentication.

πŸ•΅οΈ TryHackMe Labs – Malware & Phishing Analysis

Completed multiple TryHackMe labs focusing on malware, phishing, and network forensics.

πŸ“„ Incident Response Playbooks – Aligned with NIST

Created and tested Incident Response Playbooks aligned with NIST guidelines for malware and phishing scenarios.