Back to Developers
Akshay Pawar

Akshay Pawar

Information Security Analyst

Airoli, Navi Mumbai
80
Profile Score

About

3.2 years of experience in Information Security, working as Information security analyst in a 24/7 SOC (Security Operations Centre) environment at Capgemini. Hands-on experience in incident response, threat analysis, remediation of malware, security monitoring and operations. Strong in log analysis, phishing email analysis, incident analysis, and alert triage and prioritization.

Skills & Expertise (22)

SIEM Advanced
8.5/10
3.2
Years Exp
Incident Response Advanced
8.5/10
3.2
Years Exp
Threat Detection Advanced
8.5/10
3.2
Years Exp
EDR Advanced
8.3/10
3.2
Years Exp
Phishing Email Analysis Advanced
8.3/10
3.2
Years Exp
Splunk Advanced
8.1/10
3.2
Years Exp
SIEM rule writing Advanced
8.0/10
3.2
Years Exp
Vulnerability Assessment Advanced
8.0/10
3.2
Years Exp
Malware Behavior Analysis Advanced
8.0/10
3.2
Years Exp
MITRE ATT&CK Advanced
8.0/10
3.2
Years Exp
CrowdStrike Falcon Advanced
8.0/10
3.2
Years Exp
VirusTotal Advanced
7.8/10
3.2
Years Exp
Microsoft Defender Advanced
7.8/10
3.2
Years Exp
IBM QRadar Advanced
7.7/10
3.2
Years Exp
OSI Model Advanced
7.5/10
3.2
Years Exp
AbuseIPDB Advanced
7.5/10
3.2
Years Exp
IPvoid Advanced
7.5/10
3.2
Years Exp
Whois Advanced
7.5/10
3.2
Years Exp
TCP/IP Advanced
7.5/10
3.2
Years Exp
DHCP Advanced
7.3/10
3.2
Years Exp
DNS Advanced
7.3/10
3.2
Years Exp
ports Advanced
7.0/10
3.2
Years Exp

Work Experience

Information Security Analyst

Capgemini

Dec 2022 - Present

Monitoring security incidents/offenses using SIEM tool to analyze suspicious or malicious activities. Perform initial alert triage and prioritize incidents on severity, impact and SLA requirements. Analyzing real-time security incidents, investigation, analysis, reporting and escalations of security events from multiple log sources like firewall, IDS/IPS, EDR, proxy etc. Investigate phishing emails, malicious URLs, suspicious attachments and reported security incidents. Escalate confirmed or high severity incidents to L2/L3 teams following incident response procedure and playbooks. Creating the tickets in ticketing tool and updating the trackers once it closed. Experience on performing log analysis, phishing email analysis, malware analysis and investigation of the critical alerts at immediate basis. Conducted IOC analysis and threat intelligence enrichment using open source intelligence(OSINT) tools like VirusTotal, AbuseIPDB, IPVoid, WHOIS.COM to support incident response, threat detection, and proactive security monitoring. Working knowledge on TCP/IP model, OSI model, MITRE ATT&CK framework, and co-relating with real-life scenarios, good communication and collaboration skills. Maintain keen understanding of evolving internet threats to ensure the security of client networks. Investigate malicious phishing emails, domains and IPs using Proofpoint TAP and TRAP dashboard and open-source tools and recommend proper blocking based on analysis. Monitoring and investigating endpoint threats using CrowdStrike Falcon and Microsoft Defender. Conducting vulnerability scans across enterprise assets using Tenable. Carrying out log monitoring and incident triage, investigation, and analysis of alerts from multiple devices such as Firewalls, IDS, IPS, Proxy, web servers and so forth. Communicating with user directly in case of high priority incidents and assisting the user in the process of mitigating the attacks. Involve in preparing daily health checklist and daily, weekly, and monthly report as per client requirements, also handover notes for next shift team.

Education

Diploma in Computer Technology - MSBTE

- · Afghanistan

Bachelor of Engineering in Information Technology - Shivaji University, Kolhapur

- · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Skills (22)

SIEM Incident Response Threat Detection EDR Phishing Email Analysis Splunk SIEM rule writing Vulnerability Assessment Malware Behavior Analysis MITRE ATT&CK +12 more