Resume

MANIBHARATHI P

Cyber Security Engineer | OT/ICS Security | Endpoint & Network Security

Professional Summary

Security Engineer with 3+ years of hands-on experience in endpoint protection, network security, incident response, and security policy enforcement. Proficient in managing EDR/XDR, DLP, CASB, IAM, SIEM, and vulnerability management platforms in enterprise environments. Strong Linux and Windows administration skills with a background in scripting and automation. Passionate about learning OT/ICS security principles and contributing to the protection of operational technology environments. Certified Ethical Hacker (CEH v13 AI) with demonstrated commitment to continuous security education and open-source knowledge sharing.

Core Competencies — Aligned to OT/ICS Security

OT Relevance: Endpoint Security, Network Monitoring, Incident Response, Security Hardening, SIEM
Network Security: Firewall/Gateway Configuration, Netskope CASB, Web Security Policies, Connectivity Troubleshooting
Endpoint Security: MS Defender EDR/XDR, Manage Engine Endpoint Central, Patch Management, Anti-malware
DLP & Data Protection: Forcepoint DLP Policy Configuration, Data Transfer Monitoring, Incident Handling
IAM & Access Control: SSO, PAM, Identity Governance, Privileged Access, Azure AD, Active Directory
Scripting & Automation: PowerShell (450+ scripts), Bash, Python — AD, Intune, Exchange Online, M365
Platforms: Windows, Linux, macOS, Active Directory, Azure AD, Exchange Online, Intune, M365
Frameworks: ISO 27001:2022, NIST, HIPAA, OWASP — Compliance readiness and auditing

Professional Experience

System Engineer — Cyber Security & IT Operations

July 2022 – Present

TVS Credit Services Ltd. | Chennai, Tamil Nadu, India

  • Security Operations & Incident Response: Respond to major security incidents, threat investigation, coordinate remediation workflows; manage SIEM monitoring for endpoint/network threat detection.
  • Identify, track, and resolve security tickets related to technical/operational vulnerabilities; collaborate with developers to fix code-related security issues.
  • Endpoint & Network Security Management: Deploy and manage Microsoft Defender EDR/XDR — configure policies, conduct threat analysis; administer Manage Engine Endpoint Central for patch management and compliance.
  • Configure Netskope CASB to enforce web security policies, monitor threat activities; implement Forcepoint DLP policies to monitor data transfers and prevent breaches.
  • Apply security hardening and configuration best practices; ensure identity governance and privileged access control aligned with IAM (SSO/PAM).
  • Handle change management processes; support vulnerability management and patch deployment; manage team activities and cross-functional collaboration.

System Engineer — Desktop Support & Security (Contract)

July 2022 – Dec 2024

Precision Infomatic (Client: TVS Credit Services) | Chennai, Tamil Nadu, India

  • Provided desktop support and maintenance, diagnosing hardware/software issues, reducing system downtime.
  • Installed, configured, and upgraded OS, applications, and patches to maintain security and compliance.
  • Monitored network performance, identified connectivity issues, collaborated with network teams.
  • Educated users on IT security policies and conducted training; assisted in deploying desktops, laptops, printers, and mobile devices.
  • Maintained accurate documentation of issues and tickets for tracking and reporting.

Key Projects — Internal Security Implementations

Microsoft Defender EDR Implementation

Configured EDR policies, performed threat analysis, responded to security incidents, enhancing detection and response capabilities across enterprise endpoint estate.

Manage Engine Endpoint Central Deployment

Supported organization-wide deployment of Endpoint Central Agent — managed software distribution, patch cycles, and endpoint monitoring, improving IT operations compliance.

Netskope Internet Security (CASB)

Contributed to implementation and maintenance of Netskope — configured web security policies and monitored threat activities, reducing cyber risk and enhancing data protection.

Forcepoint DLP Data Protection

Deployed and supported Forcepoint DLP — configured data loss prevention policies, monitored data transfers, and addressed breach incidents, significantly strengthening data security posture.

Open Source Contributions — XOCODE.INFO

  • Published 450+ PowerShell automation scripts for IT admins covering AD, Azure AD, Exchange Online, Intune & M365.
  • Built SOC learning platform covering auditing, ISO standards, malware analysis, OWASP, and practical security cheat sheets.
  • Developed ISO 27001:2022 readiness assistant and security auditing/compliance platform based on ISO 27001, NIST & HIPAA.
  • Created browser-based CISSP prep app with 900+ practice questions and a massive pentesting reference collection.
  • Published privacy & security scripts for macOS, Windows, and Linux with troubleshooting guides for IT administrators.

Education

BSc Information Technology

Aug 2017 – June 2020

The American College, Madurai

Alignment with OT/ICS Security

While my hands-on experience is in IT security environments, my skills in endpoint protection, network security monitoring, incident response, and security hardening directly translate to OT/ICS security principles. I am actively expanding my knowledge of the Purdue model, IT vs OT security distinctions, and industrial network architectures to contribute meaningfully to Honeywell's operational technology security mission. I am keen to work with technologies such as Honeywell Cyber Insights, Splunk, and Honeywell Cyber Predict to build and shape next-generation OT security.

Certifications

  • All
  • Red Team
  • Blue Team
CEH Certification

Certified Ethical Hacker v13 (AI)

EC-Council / Earned: November, 2025
CRTOM

Certified Red Team Operations Mgmt (CRTOM)

Red Team
API Security

API Security Fundamentals

APIsec University
ISC2 CC

(ISC)² Certified in Cybersecurity

ISC2

Soft Skills

While technical skills are essential, soft skills set individuals apart. I have dedicated significant time to perfecting these skills to collaborate effectively and achieve the best results in any situation.

Conflict Resolution

Able to deescalate situations and resolve root causes of conflicts.

Effective Communication

Clear and concise communication, both written and verbal.

Empathy

Understanding and addressing the needs and concerns of others.

Team Collaboration

Working effectively within a team to achieve common goals.

Problem Solving

Creative and analytical approaches to overcome challenges.

Adaptability

Flexibility in dynamic and changing environments.

Physical Hacking Toolkit

Bash Bunny

A USB device that acts like a keyboard to run automated hacking scripts in seconds.

Flipper Zero

Read, clone, and interact with RFID, NFC, Bluetooth, and infrared signals.

HackRF One

Send and receive wireless signals across many frequencies — like eavesdropping on remote controls or car keys.

OMG Cable

A USB cable that looks normal but secretly runs commands when plugged in.

Proxmark3

Read, clone, and simulate RFID and NFC cards — copying building keycards or transit passes.

SharkJack

Pretends to be a network adapter to steal files, open backdoors, or take control.

Software Defined Radio Antenna

Listen, capture, and replay wireless signals from devices like garage doors or baby monitors.

USB Rubber Ducky

Looks like a flash drive, types keystrokes instantly — ideal for fast password theft.

WiFi Pineapple

Creates fake Wi-Fi hotspots to trick devices into connecting — then steals passwords or data.