About
Senior Security Analyst with 4+ years of experience in SIEM engineering, SOC operations, and end‑to‑end incident response. Specialized in Splunk, including log onboarding, correlation rule development, alert tuning and threat detection. Proficient in monitoring security events, triaging alerts, and performing root‑cause analysis to identify true positives and reduce false positives. I am skilled in cybersecurity frameworks (MITRE ATT&CK), vulnerability management, compliance monitoring, and security control validation. Adept at working within 24×7 SOC environments, improving detection coverage, supporting incident response teams, and enhancing overall security posture through continuous monitoring, threat analysis and remediation support.
Skills & Expertise (10)
Work Experience
Senior Cyber Security Analyst
Capgemini Technology Service India LTD.
Dec 2021 - Present
Monitored and investigated security alerts/offenses using SIEM platforms (Splunk) in a multi-tenant environment. Performed real-time log monitoring in the Security Operations Centre using tools such as Trend Micro Deep Security, AWS and other security solutions. Conducted phishing email analysis and remediation, ensuring timely detection and response to email-based threats. Analyzed log sources and EPS count, reporting anomalies and abnormal behaviors to the team. Raised and managed security incidents for suspicious alerts following the NIST framework, ensuring timely and accurate closure. Conduct regular follow-ups on security incidents to drive early resolution and minimize risk exposure. Recommended rule fine-tuning and misconfiguration fixes to the Use Case team for improved detection accuracy. Investigated and raised tickets for alerts triggered in Splunk across multiple products (Jira, ServiceNow). Developed and categorized playbooks aligned with the MITRE ATT&CK framework for enhanced incident response. Added Indicators of Compromise (IOCs) to reference sets for proactive anomaly detection in client networks. Monitored SIEM health metrics, escalating abnormalities to relevant teams for remediation. Communicating with clients on potential threats, providing actionable recommendations and timely reports from Splunk. Created active channels, applied filters, and maintained Splunk console configurations to ensure operational efficiency. Maintained 100% SLA compliance for incident response throughout tenure. Analyze security advisories to implement preventive measures against vulnerabilities and malware. Escalated incidents per client at SLA, performing in-depth payload analysis, and delivering mitigation strategies. Experienced in AWS Inspector scans (CVE and CIS patching) and PCI DSS audit compliance. Provided Knowledge Transfer (KT) sessions to new team members and developed Standard Operating Procedures (SOPs) for streamlined operations. Generated monthly MTTD (Mean Time to Detect) and MTTR (Mean Time to Respond) reports and executive decks for performance tracking and continuous improvement. Hands-on experience with Windows and Linux operating systems for security monitoring and troubleshooting.
Education
Bachelor of Engineering (B.E) in Mechanical Engineering - G M Institute of Technology Davanagere
2017 - 2021 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Need Sponsorship
Relocation
Depends on Offer