About
I am a Process Associate with 3+ years of experience in IT, specializing in Security Operations Center (SOC) environments. Skilled in SIEM tools such as Sumo Logic and Microsoft Azure Sentinel with strong capabilities in threat detection, incident response, log analysis, and malware/phishing analysis. Adept at creating SOPs, preparing detailed reports, and collaborating with cross-functional teams to enhance cybersecurity posture.
Skills & Expertise (3)
Work Experience
Information Security Analyst
DXC Technology
March-2022 - March-2023
Worked in a 24x7 Security Operations Center (SOC), monitoring events to detect and stop security threats. Responded to security alerts for different clients and performed vulnerability scans. Created SOPs (Standard Operating Procedures) for handling alerts based on their severity (High, Medium, Low). Used SIEM tools like Microsoft Azure Sentinel to monitor and investigate real-time security events. Monitored systems for threats and weaknesses, and took action when needed. Prepared various reports, including daily, weekly, monthly, and custom reports as per client needs. Collected and analyzed logs from network devices to find suspicious activity. Investigated security incidents, suggested solutions, and created incident reports. Prepared Root Cause Analysis (RCA) reports to explain the cause of incidents. Opened cases for suspicious issues and forwarded them to the onsite SOC team for deeper investigation.
Process Associate
Accenture
June-2023 - Present
Working with Sumo Logic (SIEM) for real-time threat detection, monitoring and response. Managing Security Incident and Event Management (SIEM) and incident response tools like ServiceNow (SNOW). Developed and maintained a threat monitoring system for timely detection and mitigation of security incidents. Investigated phishing, malware, and suspicious login activities. Conducted email threat analysis (headers, attachments, URLs). Create and maintain SOPs for high, medium, and low severity alerts. Handling escalated incidents and performing advanced tasks such as malware analysis, email threat analysis, threat hunting, phishing investigation. Prepare regular reports (daily, weekly, monthly) and dashboards for stakeholders. Coordinate with cross-functional teams to implement security best practices. Providing clear, timely, and constructive feedback to clients in line with SLA. Reduced false positives by fine-tuning SIEM rules. Built simple dashboards and reports for tracking incidents.
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
No Visa
Relocation
Open to Relocation