Back to Developers
Amruta Itnal

Amruta Itnal

Security Analyst

Bangalore
80
Profile Score

About

Currently with 4 years of experience with multiple departments as Global Defense Cyber Security operations, Incident Response, Security Engineering, Automation experience for providing cross functional services in Network Security, Information security and related field. Strong Knowledge all cross functions of Defensive cyber security roles, along with well skilled at scripting and API integrations.

Skills & Expertise (43)

SIEM tools Advanced
8.5/10
3
Years Exp
CrowdStrike Next-Gen SIEM Advanced
8.4/10
3
Years Exp
CrowdStrike Falcon Advanced
8.3/10
3
Years Exp
Splunk Advanced
8.2/10
3
Years Exp
Incident Response Advanced
8.1/10
3
Years Exp
Security Engineering GRC ServiceNow GRC OSINT Virus Total IP Void MX Toolbox ticketing tools Jira ServiceNow Nexpose Automation Network Security Information security Threat Hunting Malware Analysis Sandboxing Digital Forensics advanced threat hunting Symantec BC IBM QRadar Sumo Logic Google Chronicle EDR Tools IPS/IDS Source Fire Firewall Cisco ASA Proxy Python DLP CrowdStrike data protection Symantec DLP Cloud Security Technologies Amazon AWS Vulnerabilities Tools Qualys Guard programming languages

Work Experience

Security Analyst

Teleperformance

Jun 2023 - Present

Managed Cyber Security operations/Incident response including event monitoring which includes incident detection/response/mitigation for in house security projects. Operations incudes threat hunting, Host analysis, malware analysis. Splunk and CrowdStrike Next-Gen SIEM: event monitoring which includes incident detection, investigation and remediation. Tracking and analyzing on real time use cases and creating basic rules for SIEM, report generation. Work experience with Crowd strike EDR with isolation and containment as per MITRE framework, parent-child process relation investigations for all types of detection/response of incidents. Creation of SOAR workflows to automate the initial triage of L1 Analyst investigations to different channels like Teams, slacks, PagerDuty etc. Build Security program for engineering department, implementation/Automation including, Integration from multiple data log sources, like Crowd strike NextGen SIEM and Google Workspace. Administration of SIEM (Crowd strike NextGen SIEM) end to end with sensor deployment, host group management, upgradations, policy creations, Correlation rules for threat detections, fine tuning of alerts, etc. Install CrowdStrike agents across endpoints and perform health checks, Troubleshoot, installation, connectivity, and agent-related issues etc. Provide end to end incident handling support on any escalations from peer’s departments or stakeholders or security operations team, with full investigation response/mitigation and lesson learning with tabletop exercises. Perform Advanced Threat Hunting for any true security incidents and take action to block in all security devices and track down the infected system. Perform Malware Analysis, Sandboxing (Threat Grid, Hybrid Analysis) when required. Delivery of test stimulations of any pre-production of security solutions. Documentation of any new playbooks or solutions or responses when needed. Built custom CISO report for any possible daily major incident. Building new use cases when required as per lesson learnt from the True Incident/breach.

Security Trainee

Grassroots Solutions Pvt Ltd.

Feb 2022 - Nov 2022

Manage and operate Security operation and Cyber Security Incident Response (CSIRT)/implementation including event monitoring which includes incident detection/response/mitigation for in house Grassroots security projects based on NIST framework. Triage of security Alerts from multiple sources based on severity and investigate incoming alerts to distinguish between 'false positives' and genuine security threats. Phishing Mails processing and actions with respective service till the containment. Incident Response: Execute immediate containment actions when a compromise is confirmed (e.g., isolating infected hosts, blocking malicious IP addresses, or disabling compromised user accounts). Reporting & Documentation: Create detailed 'post-mortem' reports after incidents to document the root cause and improve future defense strategies. Vulnerability Management: Perform regular scans to identify weak points in the infrastructure and coordinate with IT teams to apply patches.

Analyst

Zavetech Business Solutions PVT LTD

Feb 2021 - Nov 2021

Managed operations at SOC including event monitoring which includes incident detection, tracking and analyzing on real time use cases, report generation, which included supporting almost more than 4 clients, and was part of end point security EPS for almost a year. SOC – Information Security operation center: Was part of security operations project from scratch, for specifically for SIEM, it includes understanding of wide network, preparing use cases, was also part of creating SIEM basic rules, fine-tuning of false positives, proactive hunting on vulnerabilities using Qualys guards, and all other operations of SOC.

Education

BSc Animation - Bharathiar University, IIFA Lancaster Degree College

- 2020 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation

Skills (43)

SIEM tools CrowdStrike Next-Gen SIEM CrowdStrike Falcon Splunk Incident Response Security Engineering GRC ServiceNow GRC OSINT Virus Total +33 more