Back to Developers
ARJUN K

ARJUN K

SOC Analyst — Cyber Defense Analyst

Bangalore, India
80
Profile Score

About

SOC Analyst with 5+ years of hands-on experience in Security Operations Center (SOC), SIEM engineering, threat detection, and incident response. Specialized in Splunk Enterprise Security and Microsoft Sentinel for detection engineering, use case development, and hypothesis-driven threat hunting. Strong expertise in malware analysis, MITRE ATT&CK mapping, alert tuning, and cloud security monitoring across Azure environments.

Skills & Expertise (18)

Security Information and Event Management (SIEM) Expert
9.1/10
7
Years Exp
Incident Response: Malware, phishing, lateral movement, privilege escalation Expert
9.0/10
5
Years Exp
Splunk Enterprise Security (ES) Expert
8.9/10
5
Years Exp
False Positive Reduction and Alert Tuning Expert
8.9/10
5
Years Exp
Incident Response and Alert Triage Expert
8.9/10
5
Years Exp
Detection Engineering and Use Case Development Expert
8.9/10
5
Years Exp
SPL (Search Processing Language) Expert
8.8/10
5
Years Exp
Threat Hunting (Hypothesis-Driven) Expert
8.7/10
5
Years Exp
MITRE ATT&CK Framework Mapping Expert
8.7/10
5
Years Exp
Splunk SIEM Expert
8.7/10
5
Years Exp
KQL (Kusto Query Language) Advanced
8.5/10
3
Years Exp
Malware Analysis (Static and Dynamic) Advanced
8.5/10
4
Years Exp
Microsoft Sentinel (Azure SIEM) Advanced
8.5/10
3
Years Exp
Microsoft Defender Advanced
8.5/10
3
Years Exp
Sentinel One (Endpoint Detection) Advanced
7.8/10
3
Years Exp
Automation Advanced
7.8/10
3
Years Exp
Darktrace (Network Detection) Intermediate
7.5/10
2
Years Exp
Arcsight (SIEM) Intermediate
7.2/10
2
Years Exp

Work Experience

Senior SOC Analyst

Network Intelligence INDIA Pvt.Ltd

Jan 2023 - Jan 2026

Developed Splunk correlation searches using SPL and Sentinel analytics rules using KQL for malware detection, credential abuse, lateral movement, and command-and-control activity. Performed hypothesis-driven threat hunting to identify advanced persistent threats (APT), LOLBins abuse, PowerShell misuse, and anomalous authentication behavior. Conducted static and dynamic malware analysis to extract indicators of compromise (IOCs), persistence mechanisms, and execution techniques. Tuned SIEM alerts and correlation rules, reducing false positives by over 40% while improving detection accuracy. Integrated log sources including Windows Event Logs, Sysmon, EDR telemetry, Azure AD (Entra ID), Microsoft Defender, firewall, proxy, VPN, and DNS logs. Led incident response activities including alert triage, containment, root cause analysis (RCA), and post-incident reporting. Built Splunk dashboards and Sentinel workbooks for SOC visibility and operational monitoring. Built real-time correlation searches for brute-force attacks followed by successful login events. Performed proactive threat hunting in Microsoft Sentinel using KQL to detect password spray, impossible travel, MFA fatigue, and privilege escalation.

SOC Analyst

Sakeesoft Pvt.Ltd

Jan 2021 - Jan 2023

Monitored and investigated security alerts from Splunk SIEM across endpoint, network, and cloud environments. Assisted in development of baseline SIEM use cases and dashboards for SOC operations. Supported malware investigations through IOC analysis, sandbox execution, and threat intelligence enrichment. Documented incident response procedures, SOC runbooks, and detection logic. Collaborated with IT and security teams to remediate vulnerabilities and security incidents.

Security Analyst

CMS IT Services

Jan 2019 - Jan 2021

Managed user accounts across Active Directory, Azure AD, and enterprise applications. Executed access provisioning/deprovisioning for new hires, transfers, and terminations. Implemented RBAC, access control matrices, and least privilege enforcement. Provisioned privileged/administrative access following approval workflows. Conducted access reviews and audit support.

Education

Bachelor of Engineering - Srinivas Institute of Technology

- 2018 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Skills (18)

Security Information and Event Management (SIEM) Incident Response: Malware, phishing, lateral movement, privilege escalation Splunk Enterprise Security (ES) False Positive Reduction and Alert Tuning Incident Response and Alert Triage Detection Engineering and Use Case Development SPL (Search Processing Language) Threat Hunting (Hypothesis-Driven) MITRE ATT&CK Framework Mapping Splunk SIEM +8 more