Back to Developers
Anisha Arora

Anisha Arora

Security Analyst

Jaipur, India
85
Profile Score

About

A SOC Analyst (L1) with hands-on experience in SIEM monitoring, alert triage, and incident investigation using Splunk, IBM QRadar, Azure Sentinel, and Microsoft Defender (EDR/XDR). Skilled in log analysis, incident escalation, ServiceNow documentation, and SOC operations within a 24/7 environment.

Skills & Expertise (20)

Azure Sentinel Intermediate
7.3/10
1
Years Exp
Microsoft Defender for Endpoint Intermediate
7.2/10
1
Years Exp
SentinelOne Intermediate
7.2/10
1
Years Exp
QRadar Intermediate
7.1/10
1
Years Exp
Splunk Intermediate
7.1/10
1
Years Exp
SIEM Monitoring Intermediate
7.1/10
1
Years Exp
Incident Investigation Intermediate
7.0/10
1
Years Exp
MITRE ATT&CK Intermediate
7.0/10
1
Years Exp
Azure Intermediate
7.0/10
1
Years Exp
Alert Triage Intermediate
6.9/10
1
Years Exp
ServiceNow Intermediate
6.9/10
1
Years Exp
OWASP Top 10 Intermediate
6.8/10
1
Years Exp
Network Services Intermediate
6.8/10
1
Years Exp
DNS Intermediate
6.8/10
1
Years Exp
TCP/IP Intermediate
6.8/10
1
Years Exp
escalation Intermediate
6.8/10
1
Years Exp
GCP Beginner
6.5/10
1
Years Exp
AWS Beginner
6.5/10
1
Years Exp
shift handover Intermediate
6.5/10
1
Years Exp
Defender XDR

Work Experience

Security Analyst Intern

ICNS Jaipur

Sep 2025 - Feb 2026

Monitored and triaged 20–25 SIEM alerts per shift using Splunk, Azure Sentinel, and IBM QRadar in a 24/7 SOC environment. Performed Level 1 incident investigations for brute-force attacks, anomalous logins, and suspicious network traffic, following SOC playbooks. Investigated endpoint alerts using Microsoft Defender for Endpoint and SentinelOne EDR, reducing investigation time by 30%. Documented 100% of incidents in ServiceNow with detailed timelines, actions taken, and escalation notes. Tuned detection rules, achieving a 20% reduction in false positives and improving alert quality for L2 escalation.

Cybersecurity Virtual Program

Mastercard

Jun 2025 - Jun 2025

Detected and analyzed phishing and social engineering attacks using IOC analysis. Recommended awareness improvements to reduce phishing exposure. Strengthened understanding of threat detection and initial response processes.

Cybersecurity Analyst Virtual Experience

Deloitte Australia

Jul 2025 - Jul 2025

Analyzed authentication and web logs to identify malicious activity mapped to MITRE ATT&CK. Supported incident response workflows, including containment and impact assessment. Prepared structured incident documentation aligned with SOC reporting standards.

Education

Bachelor of Computer Applications (Cyber Security) - JECRC University

- 2025 · Afghanistan

Class 12th (CBSE) - St. Edmund’s School

- 2022 · Afghanistan

Class 10th (CBSE) - St. Edmund’s School

- 2020 · Afghanistan

Certifications

SC-200: Microsoft Security Operations Analyst

· 2025

CEH: Certified Ethical Hacker

· 2024

CND: Certified Network Defender

· 2024

ECSS: EC-Council Certified Security Specialist

· 2023

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 5/5
Verified 5/5
Total Score 85/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Need Sponsorship

Relocation

Depends on Offer

Skills (20)

Azure Sentinel Microsoft Defender for Endpoint SentinelOne QRadar Splunk SIEM Monitoring Incident Investigation MITRE ATT&CK Azure Alert Triage +10 more