Hello, I am

Prashant Kumar

Result-driven IT security professional understanding of security protocols, cloud Security, risk management. I am responsible for contributing to the design and implementation of enterprise security strategies, architectures, and solutions to protect the company's network and meet security and compliance requirements. Possessing certificates in CISSP, CISA, CISM, PMP, CEH, and Azure Security

Download CV

Cyber Security

Information Security

Cloud Security

Network Security

About Me.

Greetings! I'm Prashant Kumar, a passionate Cyber Security Professional and Architect specializing in Network & Cloud defense strategies.
Hello! I'm Prashant Kumar, a passionate Cyber Security Professional and Architect specializing in Network & Cloud defense strategies. With a knack for best practices to mitigate risks across IT, network, and cloud environments. Armed with extensive hands-on experience, focuses on protecting digital information, systems, and infrastructure from unauthorized access, data breaches, and cyber threat. It encompasses a broad range of practices, technologies, and policies to ensure the confidentiality, integrity, and availability (CIA triad) of data. I have experience in key security technologies like Palo Alto NGFW, PAM, and Cloud CSP Azure to secure systems, networks, and data. My architecture skills in Web Application Vulnerability Analysis and Network Traffic Analysis have been instrumental in identifying and mitigating potential threats. I’ve completed over 15 projects in cybersecurity, including a PAM, Email Security , Web Security, and Cloud Security. My expertise in security protocols, risk management, and threat mitigation has been instrumental in safeguarding systems, networks, and data against security breaches. I have a proven track record of implementing robust security solutions, conducting vulnerability assessments, and responding to incidents swiftly to minimize impact. My proactive approach to threat mitigation and incident response has been instrumental in protecting digital assets and ensuring business continuity. I am proficient in developing strong analytical mindset and behavioural analytics for identification, remediation, containment, and eradication of threats targeting users and company infrastructure.

Read More

Work Experience.

Senior Security Specialist (IT & Cloud Security Team Lead)

Company: QIB

Duration: Feb. 2017 - Present

  • Main Responsibilities:
    • Deploy and manage security tools like firewalls, antivirus, and intrusion detection/prevention systems IDS/IPS.
    • Hands on Experience on Network Security Appliances which includes configuration, management and troubleshooting devices like Palo Alto, Fortinet, Cisco FTD, F5 Web Application Firewall LTM/ASM/GTM, Forcepoint, FireEye NX/EX, Cisco Email Security Appliance, Algosec Firewall Analyzer & Fireflow, Beyondtrust Privilege access Management (PAM), and Infoblox DNS Security.
    • Strong understanding of PAM solutions and tools CyberArk, BeyondTrust, & Thycotic.
    • Configure and manage VLANs, QoS, load balancing, IPSEC, Remote SSL-VPN, and other network technologies to optimize traffic flow and security.
    • Expertise in Azure Active Directory (Entra ID), ADFS, Azure AD Connect, and Azure B2C/B2B.
    • Ensure cloud infrastructures comply with legal and industry standards (QCB, GDPR, HIPAA, PCI DSS, ISO 27001) by conducting regular audits and assessments.
  • Tools and Frameworks Proficiency:
    • Engaged with 10+ industry-standard tools such as Kali Linux, Burp Suite, OWASP, CSPM tools, and Recon-ng to simulate real-world cyber-attacks and defenses. Proficient in investigating/troubleshooting IT Server Infrastructure related incidents.
    • Demonstrated proficiency in implementing key frameworks: Mitre Att&CK, NIST, and ITIL processes for threat analysis and detection.
  • Hands-On Project Experience:
    • Crafted an industry-grade project involving penetration testing on an E-Commerce website, utilizing Kali Linux, Burp Suite, and Recon-ng to discover 5 hidden flags and 10 vulnerabilities.
  • Cloud Security:
    • Developed understanding and skills in Microsoft Azure Cloud Hosting, including best practices for securing cloud environments. Familiarized with the security features of 3 major cloud service providers and Web Application Firewalls.
    • Lead cloud security operations for SaaS, IaaS, and PaaS environments, including AWS, Azure, and/or GCP.
  • Digital Forensics and Future Certifications:
    • Developed skills in digital forensics, contributing to a well-rounded understanding of cybersecurity, and certified in Cybersecurity and Ethical Hacking. Knowledgeable in LAMP based applications and Software Development / Deployment pipelines.

Senior IT Security Engineer

Company: ICT

Duration: June. 2015 – Jan. 2017

  • Main Responsibilities:
    • Diagnose and resolve network connectivity issues, including LAN/WAN, VPN, and firewall-related problems. Provide advanced troubleshooting for network and firewall incidents, escalating complex issues when necessary.
  • Operation Contributions:
    • Partner with stakeholders to evaluate security solutions
    • Implementation of security controls and processes
    • Low Level Designs
    • Firewall configuration and policy management
    • Testing
    • Documentation and training for transfer of support to Operational Teams
    • Deployment of security controls for endpoint and network
    • Technical Support
    • Maintain and improve existing network security
    • Network and host Firewall architecture and security policy
    • Hardware and software lifecycle
    • Security compliance scan result remediation
    • Audit policy for security and performance optimization, using automation tools and manual processes, based on logging and other data sources
    • IDS/IPS, Anti-virus, Malware detection
    • VPN
    • Complex maintenances
    • Escalation support
    • Managing firewall technologies, including Cisco, Palo Alto Networks, and Juniper skilled in designing and implementing firewall rules, access controls, and security zones to protect network infrastructure and data. Monitor network traffic for unusual activity and potential security breaches. Execute operational tasks for network security solutions, including network firewalls, intrusion prevention systems (IPS), proxies and web application firewalls (WAF). Install, configure, maintain, and upgrade network firewall hardware and software for all environments, including production and test. Implement, review, and update firewall rules and policies to ensure secure network access and segmentation Monitor firewall and other network security devices (IDS/IPS, proxies, etc.) for threats, anomalies, and compliance with security standards Conduct vulnerability assessments, penetration tests, and security audits of firewall configurations and network infrastructure
  • Firewalls
    • Managing firewall technologies, including Cisco, Palo Alto Networks, and Juniper skilled in designing and implementing firewall rules, access controls, and security zones to protect network infrastructure and data. Monitor network traffic for unusual activity and potential security breaches.

My Skills.

Core Domains:

  • Network Architect
  • Security Perimeter
  • Cloud Security
  • Information Security Policies
  • Risk Management

Databases:

  • MySQL
  • Oracle DB

Web Development:

  • HTML
  • CSS
  • JavaScript

Software Tools:

  • VS Code
  • GitHub
  • MongoDB
  • Microsoft Azure
  • AWS

Clouds CSP

  • Azure
  • GCP
  • AWS
  • OCI

Security Technologies:

  • Firewall
  • Email Security
  • WAF
  • PAM
  • Web Proxy
  • Load Balancer
  • NAC
  • End Point Security
  • DLP
  • Certificate Management
  • DDoS
  • DNS Security

Key Frameworks:

  • Mitre Att&CK
  • NIST
  • ISO27001
  • CIS
  • General Data Protection Regulation (GDPR)

Certifications

CISSP (Certified Information Systems Security Professional)

Issued by: ISc2

Date Issued: February 2023

CISA (Certified Information Systems Auditor)

Issued by: Isaca

Date Issued:04 Apirl 2024

CISM (Certified Information Systems Managerr)

Issued by: Alison

Date Issued: 30 July 2024

Azure Security Engineer Associate

Issued by: Microsofy

Date Issued:20 May 20234

Edureka Cybersecurity and Ethical-Hacking Internship

Issued by: Edureka

Date Issued:10 June 2024

Volunteer : Gambling Awareness Group

Issued by: Sheffield Minds & Univeristy of Sheffield

Date Issued: 10 May 2024

Prjects & Devices

Palo Alto Firewall Migration Projects Details

Palo Alto Firewall Migration Projects

Migrating to a Palo Alto Networks Next-Generation Firewall (NGFW) involves several key steps, considerations, and best practices to ensure a smooth transition from legacy firewalls. Below is a detailed breakdown of what these migration projects typically entail.

Key Steps in a Palo Alto Firewall Migration

  1. Preparation and Planning
    • Inventory and Analysis: Identify existing firewall rules, NAT configurations, VPN tunnels, and DMZ hosts. Document routing, security policies, and any third-party integrations.
    • Design Phase: Plan the new Palo Alto firewall architecture, including interface configurations, routing, NAT, and security zones.
    • Timeline and Phases: Define clear timelines for each phase, especially for critical components like VPNs and DMZ hosts.
  2. Configuration Migration
    • Migration Tools: Use tools such as Expedition to convert configurations from legacy vendors (e.g., Cisco, Check Point) to Palo Alto Networks PAN-OS. This tool helps automate and standardize the migration process, reducing errors and saving time.
    • Manual Review: After automated migration, manually review and refine configurations to align with Palo Alto’s best practices.
    • Advanced Routing Migration: For complex environments, use built-in migration scripts to transition from legacy routing engines to the advanced routing engine, resolving any exceptions highlighted during the process.
  3. Deployment and Testing
    • Parallel Deployment: Initially deploy the new Palo Alto firewall in parallel with the existing firewall to minimize risk and allow for phased migration.
    • Connectivity and Testing: Test all network paths, VPNs, and security policies. Verify that all traffic is inspected and logged as expected.
    • Logging Policies: Ensure logging is enabled for default deny rules, as Palo Alto’s default interzone deny rules do not log by default, which can cause issues during troubleshooting.
  4. Cutover and Post-Migration Activities
    • Gradual Cutover: Gradually transition traffic from the old firewall to the new one, monitoring for issues at each step.
    • Final Validation: Perform comprehensive testing with end-users and remote sites, including failover scenarios.
    • Day 2 Operations: Transition to ongoing management, including monitoring, updates, and fine-tuning of security policies.

Common Challenges and Best Practices

  • NAT Configuration Differences: NAT implementation can vary between vendors. Ensure NAT rules are correctly translated and tested on the Palo Alto firewall.
  • UDP Session Issues: UDP sessions may become stale during routing changes, especially with connectionless protocols. Monitor and clear stale sessions as needed.
  • Security Policy Migration: Pay special attention to security policy migration, as Palo Alto’s policy model and default rules differ from other vendors.
  • Logging and Visibility: Enable logging on default deny rules to ensure visibility into blocked traffic.
  • Professional Services: Consider leveraging Palo Alto Networks’ QuickStart Services or certified partners for complex migrations to minimize risk and ensure best practices are followed.

Tools and Resources

  • Expedition Migration Tool: Automates the conversion of firewall configurations from supported vendors to PAN-OS, streamlining the migration process.
  • QuickStart Services: Professional services to accelerate migration, reduce risk, and ensure a smooth transition.
  • Training: Recommended training courses such as EDU-201 cover all aspects of Palo Alto firewall installation, configuration, and management.

Summary Table: Key Migration Phases

Phase Activities
Planning Inventory, design, timeline, risk assessment
Configuration Automated migration with Expedition, manual review, advanced routing setup
Deployment Parallel deployment, connectivity testing, logging configuration
Cutover Gradual traffic transition, final validation
Post-Migration Ongoing management, monitoring, and policy tuning

Additional Considerations

  • Cloud and Remote Networks: Migration tasks may differ for cloud environments or remote networks, especially with Prisma Access or aggregate bandwidth models.
  • Custom Integration: Plan for custom integrations such as User-ID, SSL decryption, and third-party device interoperability.

A well-planned Palo Alto firewall migration project leverages automation tools, follows best practices, and includes thorough testing and validation to ensure a secure and reliable network transition.

FortiGate Firewall Migration Projects

FortiGate Firewall Migration Projects: Details and Best Practices

Overview

FortiGate firewall migration projects involve transitioning security policies, configurations, and network settings from an existing firewall (whether another FortiGate or a different vendor’s firewall) to a new FortiGate device. The goal is to ensure continuity, minimize downtime, and maintain or improve security posture during the transition.

Key Steps in a FortiGate Migration Project

  1. Audit and Review Current Configuration
    • Analyze existing firewall rules, objects, NAT policies, VPN settings, and interface mappings.
    • Remove unused objects and policies, and consider consolidating rules for efficiency.
  2. Planning and Documentation
    • Create a detailed migration plan, including timelines, maintenance windows, and rollback procedures.
    • Document interface mappings (e.g., port1 on old firewall to port2 on new FortiGate).
  3. Prepare the New FortiGate
    • Configure basic settings: interfaces, IP addresses, VLANs, routing, and administrative access.
    • Set up High Availability (HA) if needed.
  4. Configuration Migration
    • Manual Migration: Recreate objects and policies on the new device based on the audit.
    • Automated Migration: Use Fortinet’s FortiConverter service to automate the migration of configurations from legacy firewalls or older FortiGate models to new FortiGate devices. This reduces complexity and potential errors.
    • Export the configuration from the old firewall and import it into the FortiConverter tool or directly into the new FortiGate GUI.
  5. Testing and Validation
    • Test the new configuration in a lab environment if possible.
    • Perform user acceptance testing with representatives from affected departments.
  6. Cutover and Deployment
    • Schedule the cutover during a maintenance window.
    • Deploy the new FortiGate, possibly alongside the old firewall for a phased migration.
    • Implement a rollback plan in case of issues.
  7. Post-Migration Tasks
    • Verify all services and connectivity.
    • Audit the new firewall configuration and monitor for anomalies.
    • Remove or decommission the old firewall.

Tools and Services

  • FortiConverter: A paid, one-time service from Fortinet that automates configuration migration, supporting a wide range of legacy firewalls and FortiGate models.
  • Manual Migration: Supported directly through the FortiGate GUI for certain scenarios.

Best Practices

  • Thoroughly audit and document the existing firewall setup.
  • Use migration tools to reduce errors and save time.
  • Test configurations in a non-production environment.
  • Plan for rollback in case of unforeseen issues.
  • Involve stakeholders and end-users in acceptance testing.
  • Regularly review and audit the new firewall post-migration.

Example Migration Workflow

Step Description
Audit Configuration Review, clean, and document current firewall settings
Plan Migration Define timeline, maintenance window, and rollback plan
Prepare New FortiGate Configure basic settings and HA
Migrate Configuration Use FortiConverter or manual methods
Test and Validate Test in lab, perform user acceptance testing
Cutover Deploy during maintenance window, monitor closely
Post-Migration Review Verify services, audit configuration, and decommission old firewall

Additional Resources

Summary

A successful FortiGate firewall migration project requires careful planning, thorough auditing, use of automation tools like FortiConverter, and rigorous testing. Following best practices ensures a smooth transition and maintains network security throughout the process.

Full Portfolio.

BERT NLP Project

My Portfolio Summary

IT & Network Security Cloud.

Keylogger Backdoor Project

Introduction

This presentation covers the professional resume and certifications of Prashant Kumar, an experienced IT security professional with a strong focus and key expertise in Information security & cloud security architecture, holding major cyber security certifications CISSP, CISA, and CISM.

Professional Summary

2017- Present : Senior Secuirt Specialist 2015-2017: Senior IT Ssecurity Engineer 2014-2015: security Engineer 2011-2014: Network Administrator- Level2

E-Commerce Penetration Testing

Key Skills

• Cloud Security Expertise • Network Security • Identity and Access Management (IAM) • Compliance and Governance • Automation and Orchestration • Threat Detection and Response • Disaster Recovery and Business Continuity

Linux User Adminsitration Project

Cloud Security Expertise

Key Skills: • Knowledge of cloud platforms: AWS, Azure, GCP. • Securing cloud workloads and data. • Implementing encryption and key management.

Website Information Gathering

IAM

Implementing least privilege access. • Multi-factor authentication (MFA). • Role-based access control (RBAC).

Malware Creation Project

Other skills

Developed malware using FatRat, Metasploitable, and Veil, implementing techniques to bypass antivirus detection and experimenting with phishing, USB drops, and network attacks.

Certifications

CISSP, CISA, CISM, Azure-500

Cloud Security

Executed Cisco Packet Tracer projects, managing packet transmission, data authentication, and server node troubleshooting TCP/IP framework.

Information Security Compliance

Extensive knowledge of compliance regulations such as ISO 27001, NIST, and PCI DSS etc.

Housing Prices Crisis Data Analytics

Network Security Architecture

Technologies and Tools 1. Firewalls 2. Intrusion Detection/Prevention: VPN Solutions 4. SIEM Tools: 5. Cloud Security: 6. OpenSSL, HashiCorp Vault 7. Network Monitoring: 8. Zero-Trust Solutions: 9. Privilege Access Management:

ContactMe

Contact Us

Contact me

📞 +974 7092 6573
Chat on WhatsApp