Resume
MANIBHARATHI P
Cyber Security Engineer | OT/ICS Security | Endpoint & Network Security
- Chennai, Tamil Nadu, India | +91 7358909943
- manibharathi.it99@gmail.com
- linkedin.com/in/manibharathi96
Professional Summary
Security Engineer with 3+ years of hands-on experience in endpoint protection, network security, incident response, and security policy enforcement. Proficient in managing EDR/XDR, DLP, CASB, IAM, SIEM, and vulnerability management platforms in enterprise environments. Strong Linux and Windows administration skills with a background in scripting and automation. Passionate about learning OT/ICS security principles and contributing to the protection of operational technology environments. Certified Ethical Hacker (CEH v13 AI) with demonstrated commitment to continuous security education and open-source knowledge sharing.
Core Competencies — Aligned to OT/ICS Security
Professional Experience
System Engineer — Cyber Security & IT Operations
July 2022 – Present
TVS Credit Services Ltd. | Chennai, Tamil Nadu, India
- Security Operations & Incident Response: Respond to major security incidents, threat investigation, coordinate remediation workflows; manage SIEM monitoring for endpoint/network threat detection.
- Identify, track, and resolve security tickets related to technical/operational vulnerabilities; collaborate with developers to fix code-related security issues.
- Endpoint & Network Security Management: Deploy and manage Microsoft Defender EDR/XDR — configure policies, conduct threat analysis; administer Manage Engine Endpoint Central for patch management and compliance.
- Configure Netskope CASB to enforce web security policies, monitor threat activities; implement Forcepoint DLP policies to monitor data transfers and prevent breaches.
- Apply security hardening and configuration best practices; ensure identity governance and privileged access control aligned with IAM (SSO/PAM).
- Handle change management processes; support vulnerability management and patch deployment; manage team activities and cross-functional collaboration.
System Engineer — Desktop Support & Security (Contract)
July 2022 – Dec 2024
Precision Infomatic (Client: TVS Credit Services) | Chennai, Tamil Nadu, India
- Provided desktop support and maintenance, diagnosing hardware/software issues, reducing system downtime.
- Installed, configured, and upgraded OS, applications, and patches to maintain security and compliance.
- Monitored network performance, identified connectivity issues, collaborated with network teams.
- Educated users on IT security policies and conducted training; assisted in deploying desktops, laptops, printers, and mobile devices.
- Maintained accurate documentation of issues and tickets for tracking and reporting.
Key Projects — Internal Security Implementations
Microsoft Defender EDR Implementation
Configured EDR policies, performed threat analysis, responded to security incidents, enhancing detection and response capabilities across enterprise endpoint estate.
Manage Engine Endpoint Central Deployment
Supported organization-wide deployment of Endpoint Central Agent — managed software distribution, patch cycles, and endpoint monitoring, improving IT operations compliance.
Netskope Internet Security (CASB)
Contributed to implementation and maintenance of Netskope — configured web security policies and monitored threat activities, reducing cyber risk and enhancing data protection.
Forcepoint DLP Data Protection
Deployed and supported Forcepoint DLP — configured data loss prevention policies, monitored data transfers, and addressed breach incidents, significantly strengthening data security posture.
Open Source Contributions — XOCODE.INFO
- Published 450+ PowerShell automation scripts for IT admins covering AD, Azure AD, Exchange Online, Intune & M365.
- Built SOC learning platform covering auditing, ISO standards, malware analysis, OWASP, and practical security cheat sheets.
- Developed ISO 27001:2022 readiness assistant and security auditing/compliance platform based on ISO 27001, NIST & HIPAA.
- Created browser-based CISSP prep app with 900+ practice questions and a massive pentesting reference collection.
- Published privacy & security scripts for macOS, Windows, and Linux with troubleshooting guides for IT administrators.
Education
BSc Information Technology
Aug 2017 – June 2020
The American College, Madurai
Alignment with OT/ICS Security
While my hands-on experience is in IT security environments, my skills in endpoint protection, network security monitoring, incident response, and security hardening directly translate to OT/ICS security principles. I am actively expanding my knowledge of the Purdue model, IT vs OT security distinctions, and industrial network architectures to contribute meaningfully to Honeywell's operational technology security mission. I am keen to work with technologies such as Honeywell Cyber Insights, Splunk, and Honeywell Cyber Predict to build and shape next-generation OT security.
Soft Skills
While technical skills are essential, soft skills set individuals apart. I have dedicated significant time to perfecting these skills to collaborate effectively and achieve the best results in any situation.
Conflict Resolution
Able to deescalate situations and resolve root causes of conflicts.
Effective Communication
Clear and concise communication, both written and verbal.
Empathy
Understanding and addressing the needs and concerns of others.
Team Collaboration
Working effectively within a team to achieve common goals.
Problem Solving
Creative and analytical approaches to overcome challenges.
Adaptability
Flexibility in dynamic and changing environments.
Physical Hacking Toolkit

Bash Bunny
A USB device that acts like a keyboard to run automated hacking scripts in seconds.
Flipper Zero
Read, clone, and interact with RFID, NFC, Bluetooth, and infrared signals.
HackRF One
Send and receive wireless signals across many frequencies — like eavesdropping on remote controls or car keys.

OMG Cable
A USB cable that looks normal but secretly runs commands when plugged in.
Proxmark3
Read, clone, and simulate RFID and NFC cards — copying building keycards or transit passes.

SharkJack
Pretends to be a network adapter to steal files, open backdoors, or take control.
Software Defined Radio Antenna
Listen, capture, and replay wireless signals from devices like garage doors or baby monitors.

USB Rubber Ducky
Looks like a flash drive, types keystrokes instantly — ideal for fast password theft.
WiFi Pineapple
Creates fake Wi-Fi hotspots to trick devices into connecting — then steals passwords or data.



