Back to Developers
Asha.k Asha.k

Asha.k Asha.k

Cybersecurity Analyst

Bengaluru, India 78 · Very Good

About

Cybersecurity Analyst with 1.6 years of experience in SOC operations, SIEM monitoring, and cloud security. Skilled in Splunk, AWS WAF, and Azure Sentinel, with hands-on expertise in threat hunting, IOC analysis, incident response, and vulnerability management across production environments.

Skills & Expertise (13)

AWS Intermediate
7.6/10
1.6
Years Exp
Threat Hunting Intermediate
7.5/10
1.6
Years Exp
Log Analysis Intermediate
7.5/10
1.6
Years Exp
Splunk Intermediate
7.4/10
1.6
Years Exp
Incident Response Intermediate
7.4/10
1.6
Years Exp
WAF Intermediate
7.3/10
1.6
Years Exp
IOC Analysis Intermediate
7.3/10
1.6
Years Exp
Guard Duty Intermediate
7.1/10
1.6
Years Exp
CloudWatch Intermediate
7.0/10
1.6
Years Exp
Azure Sentinel Intermediate
6.9/10
1.6
Years Exp
Datadog Intermediate
6.8/10
1.6
Years Exp
Power BI Beginner
6.0/10
1.6
Years Exp
Basic Linux Beginner
5.8/10
1.6
Years Exp

Work Experience

Cybersecurity Engineer

Lenovo

Nov 2024 - Present

Investigate, triage, and validate security alerts in Splunk SIEM, performing IOC-based analysis and proactive threat hunting. Perform proactive threat hunting using Splunk queries, analyzing log patterns and notable events to identify suspicious activity. Execute daily threat detection checks to identify anomalies and potential security threats. Analyze AWS WAF logs across multiple log groups to detect suspicious traffic patterns and potential threats. Identify and validate malicious IPs using Threat Intelligence tools and enforce blocking actions in AWS WAF to mitigate potential threats. Monitor and analyze AWS CloudTrail logs to detect unauthorized or anomalous user activity. Track and escalate AWS Guard Duty findings across multiple regions, prioritizing high-severity alerts. Monitor infrastructure using Datadog, identifying and escalating ELB/API anomalies based on severity thresholds. Ensure continuous log ingestion and data integrity in Splunk, identifying and resolving ingestion issues. Perform post-patching validation of monitoring systems, ensuring uninterrupted log flow and detection coverage. Perform log correlation and event analysis in Azure Sentinel (POC), including Azure Key Vault logs, to classify security events. Manage vulnerability tracking using Defect Dojo, ingesting scan results (Rapid7) and validating affected assets. Drive remediation by creating and tracking security tickets, ensuring timely resolution of identified vulnerabilities.

Education

B. Tech in Computer Science and Engineering - Reva University

- · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 18/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 78/100

Profile Overview

Member sinceApr 2026

Availability Details

Visa Status

Citizen

Relocation

Not Open to Relocation