Back to Developers
Lokesh Bandi

Lokesh Bandi

Senior Security Analyst

80
Profile Score

About

Having a total 6 years of experience as Security Operations Centre analyst and Incident Response in MSSP and Internal Organization architectures. Led a high-performing team as Shift Lead in SOC monitoring, incident analysis, and triage at Covasant technologies and Dcube data sciences as a Security Analyst. Managed 24x7 SOC operations, overseeing event monitoring, incident detection, tracking, and real time analysis, while generating comprehensive report. Skilled in adapting to new technologies, tools, and applications, with a focus on monitoring security incidents and vulnerability assessment management. Integrated SOAR platforms to streamline security operations, enhancing threat detection and response capabilities across multiple environments. Developed and implemented automated security playbooks for incident response, reducing response time and improving efficiency in handling security incidents such as phishing, malware detection, and unauthorized access. Preparing project status report in MS Excel.

Skills & Expertise (47)

Security Operations Centre Expert
9.1/10
6
Years Exp
Incident Response Expert
9.0/10
6
Years Exp
Threat Detection Expert
8.9/10
6
Years Exp
SIEM Advanced
8.8/10
6
Years Exp
Vulnerability assessment management Advanced
8.7/10
6
Years Exp
Cyber Kill-Chain Forensic Analysis Security architectures Splunk Enterprise Google Chronicle CrowdStrike Falcon Microsoft Purview ProofPoint Phisher Splunk SOAR ITSM ServiceNow Tenable.io Security Incident Reporting Incident Response Playbooks Malwarebytes Microsoft Defender Security Policies Procedures Best practices Threat Intelligence Phishing SOC Monitoring Incident analysis Triage Event Monitoring Incident detection Tracking Real Time Analysis SOAR platforms Response capabilities Security playbooks OSINT Malware Detection Unauthorized access MS Excel EDR DLP IDS/IPS Firewalls AWS Azure

Work Experience

Senior Security Analyst

Dcube Data Science

Sep 2023 - Sep 2025

Monitoring and analysis of cyber security events using Splunk soar SIEM. Monitor internal and external threats, examine logs, events, and alerts generated by multiple platforms for anomalous activity. Development and execution of SOC and standard operating procedures (SOP). Triage security events and incidents, detect anomalies, and report/direct remediation actions. Timely escalate security incidents whenever SLA's are not met. Assist in incident detection and resolving incidents by following all phases of incident management lifecycle. Integrate and collaborate threat information to improve incident detection capabilities. Should be capable of report generation from security solutions and preparation of report for management or leadership review. Collect evidence of security incidents, and other error conditions that may constitute a breach in security or a degradation of integrity or confidentiality of systems and data. Ability to coordinate and work with stakeholders to track security incidents till closure.

Senior Security Analyst

Covasant Technologies

Oct 2025 - Present

Continuously monitor security events from various sources, including SIEM, EDR, DLP, IDS/IPS, firewalls, and other security tools. Identify and categorize security events, incidents, and anomalies. Perform initial analysis of security events to determine if they are true positives or false positives. Escalate confirmed security incidents to SOC L2 or L3 analysts for further investigation and response. Responded to DLP alerts by conducting detailed investigations and performing incident response activities to resolve data leakage threats. Familiarity with cloud platforms (AWS) and (AZURE) their security controls. Understanding of open-source network analysis tools and intelligence tools (OSINT). In-depth knowledge of the Cyber Kill-Chain, intelligence-driven defense and security architectures. Assist in the development and implementation of security policies, procedures, and best practices to enhance the organization’s security posture. Work closely with IT teams and other departments to integrate security measures into the organization’s processes and systems. Performance, health, and latency monitoring of Security devices and Maintain awareness of emerging attacks.

Senior Security Analyst

DriveIT Technologies

Feb 2023 - Aug 2023

Continuously monitor security events from various sources, including SIEM, EDR, DLP, IDS/IPS, firewalls, and other security tools. Identify and categorize security events, incidents, and anomalies. Perform initial analysis of security events to determine if they are true positives or false positives. Escalate confirmed security incidents to SOC L2 or L3 analysts for further investigation and response. Execute predefined incident response procedures for common security events. Assist in the containment and remediation of low-level security incidents. Stay informed about current security threats and vulnerabilities. Apply threat intelligence to improve detection and response capabilities. Generate daily, weekly, and monthly security reports for management. Work closely with other SOC team members and IT staff to ensure effective security operations. Communicate effectively with stakeholders regarding security incidents and status updates. Stay current with emerging security trends, technologies, and threats.

Soc Analyst L1

BSW Soft Pvt Ltd

Dec 2019 - Jan 2023

Monitor and analyze security events and incidents using Splunk SOAR, Splunk Enterprise to identify potential threats. Performed in-depth analysis. Utilize CrowdStrike Falcon for endpoint security, including threat hunting and malware analysis and mitigation of endpoint threats across the organization. Leveraged Microsoft Purview to classify and monitor sensitive data, preventing unauthorized sharing and mitigating potential data breaches. Responded to DLP alerts by conducting detailed investigations and performing incident response activities to resolve data leakage threats. Configure and maintain Proofpoint email security to detect and prevent phishing attempts. Hands-on Experience on Vulnerability Assessment Management. Actively contributed to improving security processes and procedures through continuous collaboration with cross-functional teams, ensuring the integration of cybersecurity best practices. Implement and fine-tune security policies, rules, and alerts to enhance detection capabilities and reduce false positives. Perform forensic analysis and gather evidence for security incidents as part of incident response procedures. Create and maintain documentation related to security procedures, incident response plans, and standard operating procedures.

Education

Bachelor of Commerce (C.A) - Sri Venkateswara University, Tirupati

- 2018 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Skills (47)

Security Operations Centre Incident Response Threat Detection SIEM Vulnerability assessment management Cyber Kill-Chain Forensic Analysis Security architectures Splunk Enterprise Google Chronicle +37 more