About
Senior Security Analyst with 3.5 years of experience in Security Operations (SOC) and Incident Response. Hands-on expertise in network security components and security tools. Skilled in monitoring, analyzing, and responding to security threats, with a strong ability to apply technical expertise to enhance organizational security posture. Passionate about continuous learning and growth in the ever-evolving cybersecurity landscape, leveraging experience to contribute to both incident response and proactive threat mitigation.
Skills & Expertise (25)
Work Experience
Senior Consultant-Cybersecurity
LTI MINDTREE
Jul 2025 - Present
Manage end-to-end incident response coordination for Microsoft Defender product suite, including Microsoft Defender for Identity (MDI), Microsoft Defender for Office (MDO), Microsoft Defender for Endpoint (MDE), and Microsoft Defender for Cloud (MDC). Investigate, triage, and remediate security incidents across diverse environments, ensuring rapid containment and minimizing business impact. Collaborate with Microsoft engineering and client stakeholders to validate alerts, escalate critical incidents, and drive resolution within defined SLAs. Perform deep-dive analysis of Defender alerts, correlating signals across multiple platforms to identify advanced persistent threats (APTs) and targeted attacks. Coordinate forensic evidence collection, log analysis, and threat intelligence integration to strengthen detection and response capabilities. Develop and refine incident response workflows, ensuring seamless communication between SOC teams, engineering, and client security leadership. Provide detailed incident reports, RCA documentation, and recommendations for proactive threat mitigation and security posture improvement. Contribute to continuous improvement by fine-tuning Defender policies, detection rules, and automation playbooks to reduce false positives and enhance efficiency.
Senior Security Analyst
HCL Technologies Ltd
Aug 2022 - Jun 2025
Monitored and analysed daily security events using SIEM tools, investigating alerts from DLP, IDS/IPS, EDR, firewalls, and system logs. Identified and responded to security incidents including malware infections, phishing attempts, and unauthorized access, performing initial triage and escalation. Developed and maintained Standard Operating Procedures (SOPs) and Incident Response Playbooks to streamline security event handling. Analysed logs from diverse security devices to detect anomalies and Indicators of Compromise (IOCs), supporting proactive threat mitigation. Conducted host isolation, collected forensic evidence from infected systems, and escalated findings to DFIR and malware analysis teams. Collaborated with the Threat Intelligence team to analyse IOC feeds, ensuring timely blocking of malicious indicators across the organization. Generated reports on SOC Tier 1 case handling, SLA breaches, and Root Cause Analysis (RCA), presenting findings to clients during weekly sync-up calls. Monitored Splunk data nodes/services for log feed disruptions, coordinating with engineering teams to resolve downtime efficiently. Partnered with Alert/Trap teams to fine-tune alerts, reducing false positives and improving detection accuracy.
Education
B.Tech in Computer Science and Engineering (CSE) - Sri Venkateswara College of Engineering and Technology, Etcherla, Srikakulam, AP
2018 - 2022 · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Skills (25)
Click a skill to find developers with the same skill