About
Entry-to-mid level SOC Analyst (L1) with 2+ years of hands-on experience in security monitoring, alert triage, and incident analysis using Splunk SIEM. Strong understanding of SOC workflows including log analysis, alert validation, escalation procedures, and false-positive reduction. Proven ability to support 24x7 monitoring environments and collaborate with L2/L3 teams for effective incident response.
Skills & Expertise (15)
Work Experience
SOC Analyst / Splunk Engineer
RGBSI
Sep 2023 - Dec 2025
Performed real-time security monitoring and alert triage using Splunk dashboards and alerts. Investigated L1 security alerts including suspicious logins, network anomalies, and system events. Validated alerts, identified false positives, and escalated confirmed incidents to L2/L3 teams. Analyzed logs from system, network, and security devices to support incident investigations. Created and tuned Splunk alerts and dashboards to improve detection accuracy and visibility. Assisted in incident documentation, ticket updates, and shift handovers. Supported log source onboarding and ensured data quality for SOC monitoring.
Intern – Project Management & Cybersecurity
Tech Curators / IETE Bangalore
Aug 2023 - Sep 2023
Assisted in planning and execution of IoT and cybersecurity-focused projects. Worked on secure data transmission and basic log analysis concepts. Gained practical exposure to IDS/IPS, TCP/IP, and Splunk log collection pipelines.
Education
B.Tech – Electronics & Communication Engineering - Atria Institute of Technology
2019 - 2023 · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Skills (15)
Click a skill to find developers with the same skill