About
SOC Analyst with hands-on experience in security operations and incident response. Proven ability to monitor, investigate, and mitigate cyber threats using SIEM tools, threat intelligence, and IOC analysis. Experienced in log monitoring, alert triage, and security event correlation to identify and respond to potential incidents. Strong background in securing and supporting Linux-based environments, including web server and service security. Detail-oriented and self-motivated professional with strong analytical, problem-solving, and communication skills.
Skills & Expertise (29)
Work Experience
Linux Trainer
KeysShell IT Solutions
Jul 2024 - Jan 2025
Junior Technical Engineer
Buzzworks Business Services Ltd
Jul 2022 - Sep 2023
Managed user accounts, file systems, and processes, ensuring secure and optimized system performance. Installed, configured, and maintained LAMP Server (Linux, Apache, MySQL, PHP). Troubleshot and resolved web server downtime issues, minimizing service interruptions. Configured hardware partitions, swap memory, and job scheduling to optimize system resource utilization. Administered DNS, FTP, and SSH services, including setting up password less login for secure automation. Performed package management, server monitoring, and log analysis for proactive maintenance and security. Provided remote system support to end-users and clients, ensuring smooth IT operations. Hands-on experience with Cisco routers and switches for basic network configuration and troubleshooting.
SOC Analyst
NTT DATA
Feb 2025 - Present
Monitor and analyze real-time security events using SIEM tools, identifying potential threats and initiating mitigation actions. Perform detailed investigation and root cause analysis of security alerts, incidents, and anomalies to ensure accurate incident handling. Monitor inbound and outbound firewall traffic, investigate suspicious activity, and escalate threats as required. Manage incident lifecycle: triage, follow-up with clients, coordinate with cross-functional teams, and close tickets after resolution. Conduct IOC (Indicators of Compromise) monitoring and threat intelligence correlation to detect malicious activities. Prepare and deliver comprehensive daily, weekly, and monthly reports for management and clients, highlighting security trends and KPIs. Respond to operational support network events and ensure compliance with security policies. Hands-on experience in event monitoring, log analysis, and incident investigation on a daily basis. Improved incident response efficiency by ensuring accurate documentation and knowledge sharing within the SOC team. Manual Threat Hunting.
Education
MSC - Electronics - MES College Marampilly
- 2017 · Afghanistan
Certifications
AWS S3 Basics
Course Era · 2026
Security Assessment and Testing
Course Era · 2026
Linux Administration
Keyshell Academy · 2024
Certified IT Infrastructure and Cyber SOC Analyst
Red Team Hackers Academy · 2022
CEH (Certified Ethical Hacker)
EC-Council · 2022