Result-driven IT security professional understanding of security protocols, cloud Security, risk management. I am responsible for contributing to the design and implementation of enterprise security strategies, architectures, and solutions to protect the company's network and meet security and compliance requirements. Possessing certificates in CISSP, CISA, CISM, PMP, CEH, and Azure Security
Download CV
Greetings! I'm Prashant Kumar, a passionate Cyber Security Professional and Architect specializing in Network & Cloud defense strategies.
Hello! I'm Prashant Kumar, a passionate Cyber Security Professional and Architect specializing in Network & Cloud defense strategies. With a knack for best practices to mitigate risks across IT, network, and cloud environments.
Armed with extensive hands-on experience, focuses on protecting digital information, systems, and infrastructure from unauthorized access, data breaches, and cyber threat. It encompasses a broad range of practices, technologies, and policies to ensure the confidentiality, integrity, and availability (CIA triad) of data. I have experience in key security technologies like Palo Alto NGFW, PAM, and Cloud CSP Azure to secure systems, networks, and data. My architecture skills in Web Application Vulnerability Analysis and Network Traffic Analysis have been instrumental in identifying and mitigating potential threats.
I’ve completed over 15 projects in cybersecurity, including a PAM, Email Security , Web Security, and Cloud Security. My expertise in security protocols, risk management, and threat mitigation has been instrumental in safeguarding systems, networks, and data against security breaches. I have a proven track record of implementing robust security solutions, conducting vulnerability assessments, and responding to incidents swiftly to minimize impact. My proactive approach to threat mitigation and incident response has been instrumental in protecting digital assets and ensuring business continuity. I am proficient in developing strong analytical mindset and behavioural analytics for identification, remediation, containment, and eradication of threats targeting users and company infrastructure.
Company: QIB
Duration: Feb. 2017 - Present
Company: ICT
Duration: June. 2015 – Jan. 2017
Issued by: ISc2
Date Issued: February 2023
Issued by: Isaca
Date Issued:04 Apirl 2024
Issued by: Alison
Date Issued: 30 July 2024
Issued by: Microsofy
Date Issued:20 May 20234
Issued by: Edureka
Date Issued:10 June 2024
Issued by: Sheffield Minds & Univeristy of Sheffield
Date Issued: 10 May 2024
Migrating to a Palo Alto Networks Next-Generation Firewall (NGFW) involves several key steps, considerations, and best practices to ensure a smooth transition from legacy firewalls. Below is a detailed breakdown of what these migration projects typically entail.
Phase | Activities |
---|---|
Planning | Inventory, design, timeline, risk assessment |
Configuration | Automated migration with Expedition, manual review, advanced routing setup |
Deployment | Parallel deployment, connectivity testing, logging configuration |
Cutover | Gradual traffic transition, final validation |
Post-Migration | Ongoing management, monitoring, and policy tuning |
A well-planned Palo Alto firewall migration project leverages automation tools, follows best practices, and includes thorough testing and validation to ensure a secure and reliable network transition.
FortiGate firewall migration projects involve transitioning security policies, configurations, and network settings from an existing firewall (whether another FortiGate or a different vendor’s firewall) to a new FortiGate device. The goal is to ensure continuity, minimize downtime, and maintain or improve security posture during the transition.
Step | Description |
---|---|
Audit Configuration | Review, clean, and document current firewall settings |
Plan Migration | Define timeline, maintenance window, and rollback plan |
Prepare New FortiGate | Configure basic settings and HA |
Migrate Configuration | Use FortiConverter or manual methods |
Test and Validate | Test in lab, perform user acceptance testing |
Cutover | Deploy during maintenance window, monitor closely |
Post-Migration Review | Verify services, audit configuration, and decommission old firewall |
A successful FortiGate firewall migration project requires careful planning, thorough auditing, use of automation tools like FortiConverter, and rigorous testing. Following best practices ensures a smooth transition and maintains network security throughout the process.