Say no to manually filling long application forms
Visit any careers page and a lightning button will pop up on any compatible page with a form
Use ChatGPT to auto-fill job forms
Ask for Referral for any job post
Adit Shah
Security Incident Manager
About
Adit Shah is a highly accomplished Senior Security Engineer at Twilio with extensive experience in the field of cybersecurity. With a career spanning almost five years, Adit has honed his skills in incident response and service desk management, making him a valuable asset to any organization. Adit's career began as a Service Desk Analyst at Northeastern University, where he was responsible for providing technical support to staff and students. He then moved on to RSA Security, where he worked as an Incident Response Analyst, handling critical security incidents and working closely with clients to resolve issues. Currently, Adit is a Senior Security Engineer at Twilio, where he is responsible for developing and implementing security policies and procedures. He is also involved in conducting security assessments and audits, as well as identifying and mitigating potential security threats. Adit holds a Bachelor's degree in Computer Engineering from Gujarat University and has completed multiple certifications in cybersecurity. He is currently pursuing a Master's degree in Information Systems from Northeastern University. Adit's expertise in cybersecurity, combined with his experience in incident response and service desk management, make him a well-rounded professional who can provide valuable insights and solutions to any organization. He is a proactive and results-driven individual who is always seeking new challenges and opportunities to grow and develop his skills.
Education
• northeastern university
• gujarat university
Companies
• twilio
• rsa security
• massmutual
• oppenheimerfunds
• northeastern university
Experience
9.6 Years
Find anyone’s contact
Experience
Skills
Boost your visibility and stand out to employers with referrals from your LinkedIn connections.
access points
accounting
acting
active directory
advertising
alerts
analysis
analytics
applications
applied probability
assessment
assurance
authentication
blends
c
c++
carbonblack
chain
checking
Coaching
combination
Communication
community
comptia
computer architecture
computer engineering
computer forensics
computer related
computer security
computing
consumption
contractual agreements
correlation
covering
cryptography
cyber
cyber operations
cyber security
cybercrime
cyberlaw
data analysis
data logging
data warehousing
databases
dell computers
deployments
dhcp
dnssec
domaintools
due diligence
emc
encapsulation
engineering
enterprise software
finance
financial services
firewalls
flow analysis
fluke
foundations
gaps
https
human resources
hunting
hyena
iam
icmp
identity management
image capture
incident
incident response
industrial engineering
information assurance
information security
information technology
infrastructure
integration
intelligence
intelligence analysis
interfaces
internal audit
investigation
ip networking
ips
ipsec
Leadership
log analysis
logging
mac
management system
media
media analysis
metadata
microsoft office
mining
mobile computing
mock
monitors
mysql
nat
netwitness
network communications
network monitoring tools
network security
network topology
networking
odd
oop
open source
operating systems
operations
operations research
organizational behavior
packet
policy
Presentation Skills
printers
proactive monitoring
probability
profiles
programming
proliferation
qradar
qualys
relationship management
relevance
remediation
reporting
reports
research
responsibility
reverse engineering
root
rsa security
rules
scanners
security
security operations
Security Operations
security operations center
security tools
servers
services
sharepoint
siem
soc
social media
software
software engineering
sop
source intelligence
splunk
sql
ssh
ssl certificates
stack
statistics
strategy
students
supervisor
supply chain engineering
synopsis
synthesize
system
system configurations
tabletop
tactics
tcp/ip
testing
the environment
threat
threat analysis
threat and vulnerability management
threat assessment
threat intelligence
threat modeling
timelines
triage
troubleshooting
tunnels
udp
variables
varonis
vectors
verisign
vulnerability
windows
Contact Details
Email (Verified)
adiXXXXXXXXXXXXXXXXXXXXXomMobile Number
+91XXXXXXXXXXEducation
northeastern university
Master's Degree
2011 - 2014
gujarat university
BE
2007 - 2011
Frequently asked questions
Find anyone’s contact and let Weekday reach out to them on your behalf
Start hiring nowStop manually filling job applications. Use AI to auto-apply to jobs
Look for jobs now