Back to Developers
Ali Shaik

Ali Shaik

Process Associate

India
58
Profile Score

About

I am a Process Associate with 3+ years of experience in IT, specializing in Security Operations Center (SOC) environments. Skilled in SIEM tools such as Sumo Logic and Microsoft Azure Sentinel with strong capabilities in threat detection, incident response, log analysis, and malware/phishing analysis. Adept at creating SOPs, preparing detailed reports, and collaborating with cross-functional teams to enhance cybersecurity posture.

Skills & Expertise (3)

Microsoft Azure Sentinel Phishing Phishing Email Analysis

Work Experience

Information Security Analyst

DXC Technology

March-2022 - March-2023

Worked in a 24x7 Security Operations Center (SOC), monitoring events to detect and stop security threats. Responded to security alerts for different clients and performed vulnerability scans. Created SOPs (Standard Operating Procedures) for handling alerts based on their severity (High, Medium, Low). Used SIEM tools like Microsoft Azure Sentinel to monitor and investigate real-time security events. Monitored systems for threats and weaknesses, and took action when needed. Prepared various reports, including daily, weekly, monthly, and custom reports as per client needs. Collected and analyzed logs from network devices to find suspicious activity. Investigated security incidents, suggested solutions, and created incident reports. Prepared Root Cause Analysis (RCA) reports to explain the cause of incidents. Opened cases for suspicious issues and forwarded them to the onsite SOC team for deeper investigation.

Process Associate

Accenture

June-2023 - Present

Working with Sumo Logic (SIEM) for real-time threat detection, monitoring and response. Managing Security Incident and Event Management (SIEM) and incident response tools like ServiceNow (SNOW). Developed and maintained a threat monitoring system for timely detection and mitigation of security incidents. Investigated phishing, malware, and suspicious login activities. Conducted email threat analysis (headers, attachments, URLs). Create and maintain SOPs for high, medium, and low severity alerts. Handling escalated incidents and performing advanced tasks such as malware analysis, email threat analysis, threat hunting, phishing investigation. Prepare regular reports (daily, weekly, monthly) and dashboards for stakeholders. Coordinate with cross-functional teams to implement security best practices. Providing clear, timely, and constructive feedback to clients in line with SLA. Reduced false positives by fine-tuning SIEM rules. Built simple dashboards and reports for tracking incidents.

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 8/20
🎓 Education 0/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 58/100

Profile Overview

Member sinceSep 2025

Availability Details

Visa Status

No Visa

Relocation

Open to Relocation

Skills (3)

Microsoft Azure Sentinel Phishing Phishing Email Analysis