About
Dedicated Cyber Security SOC Analyst with 2 years of hands-on Security Operations experience in enterprise environments at Genpact. Skilled in alert triage, incident identification, SIEM monitoring, and phishing analysis across Splunk and Microsoft Sentinel platforms. Proficient in CrowdStrike Falcon endpoint security and threat intelligence tools including VirusTotal and AbuseIPDB. Strong foundational knowledge of incident response workflows and SOC operations processes. Proven ability to follow SOPs, maintain detailed documentation, and escalate security incidents appropriately. Quick learner with strong analytical skills and commitment to continuous cybersecurity skill development. Seeking to grow expertise in threat hunting, compliance support, and advanced detection capabilities while supporting 24x7 SOC operations.
Skills & Expertise (20)
Work Experience
Security Operations Center Analyst (SOC L1)
Genpact
Jan 2023 - Present
Enterprise-scale 24x7 SOC environment in MSSP setting, supporting multiple enterprise clients. Monitor and triage 50–100+ daily security alerts from Splunk and Microsoft Sentinel across endpoint and network sources. Perform initial investigation of alerts following SOC procedures and escalation guidelines. Differentiate between benign alerts and genuine security concerns with guidance from senior team members. Assist in investigation of phishing, suspicious login, and endpoint-related security incidents. Investigate CrowdStrike Falcon endpoint alerts and perform basic process tree analysis. Validate indicators of compromise (IOCs) using VirusTotal, Hybrid Analysis, and other threat intelligence tools. Properly document findings and escalate complex incidents to senior analysts and Tier-2/Tier-3 teams. Analyze suspicious emails using Microsoft Defender for Office 365 and threat intelligence tools. Review email headers, validate URLs and sender reputation for phishing indicators. Recommend appropriate actions (block, quarantine, delete) and document recommendations in tickets. Work with ServiceNow ticketing system to document findings, update incident status, and maintain audit trails. Support 24x7 SOC operations through shift-based monitoring and following incident escalation procedures. Maintain detailed shift handover documentation to ensure operational continuity. Collaborate with senior analysts and IT teams during incident handling and operational support. Actively pursue cybersecurity certifications and professional development. Engage in internal training programs and security labs to deepen SOC operations knowledge. Study MITRE ATT&CK framework and incident response fundamentals through self-learning.
Process Associate – Order to Cash (Billing & Cash Applications)
Genpact
Jan 2021 - Dec 2022
Worked in Order-to-Cash operations, managing invoice processing, payment reconciliation, and accounts receivable. Developed strong analytical, documentation, and communication skills in process-driven enterprise environment. Transitioned to cybersecurity role through internal career development and self-directed learning.
Customer Relationship Officer
AOTAX
Nov 2019 - May 2020
Supported U.S. clients with compliance-focused financial documentation and regulatory processes.
Accounts Receivable Specialist
Dave IT Solutions
Jul 2015 - May 2017
Managed healthcare and insurance AR workflows with focus on accuracy and documentation.
Education
Bachelor of Commerce (B.Com) - Kakatiya University
2014 - 2019 · India
Certifications
CompTIA Security+ (SY0-701)
· 2026
IBM Cybersecurity Analyst Professional Certificate
· 2025
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation
Skills (20)
Click a skill to find developers with the same skill