Back to Developers
bharath b

bharath b

L2 SOC Analyst

India
80
Profile Score

About

L2 SOC Analyst with 3.2 years of experience in Security Operations Center (SOC) environments specializing in SIEM monitoring, endpoint detection & response (EDR), incident investigation, and threat analysis. Hands-on expertise in IBM QRadar and SentinelOne for alert triage, offense investigation, malware containment, and phishing analysis. Experienced in handling 25+ security incidents weekly including medium to high severity cases while maintaining 100% SLA compliance. Proficient in MITRE ATT&CK mapping, IOC analysis, log correlation, and cross-functional coordination for effective incident remediation.

Skills & Expertise (17)

L2 SOC Operations & Incident Response Advanced
8.1/10
3
Years Exp
EDR Advanced
8.0/10
3
Years Exp
SentinelOne Advanced
8.0/10
3
Years Exp
SIEM Monitoring Advanced
7.9/10
3
Years Exp
IBM QRadar Intermediate
7.5/10
1
Years Exp
Basic Linux Log Analysis False Positive Reduction & Alert Validation Log Analysis SLA-Based Incident Handling & Escalation Management ServiceNow Incident Management Root Cause Analysis (RCA) Brute Force & Account Compromise Investigation Windows Security Event Monitoring MITRE ATT&CK Framework Mapping Indicator of Compromise (IOC) Identification & Blocking Threat Detection & Response Phishing & Malware Investigation

Work Experience

Security Analyst

Persistent Systems

Dec 2022 - Jul 2023

Monitored and investigated security offenses using IBM QRadar SIEM. Performed log correlation and analysis across network, endpoint, and security devices. Identified Indicators of Compromise (IOCs) and supported L2 investigations. Conducted initial alert triage and reduced false positives through effective validation. Followed SOC playbooks and escalation procedures for confirmed incidents. Documented findings, remediation steps, and security recommendations.

L2 SOC Analyst

Cognizant

Aug 2023 - Present

Investigate and resolve 25–30 security incidents per week including high severity malware, phishing, and endpoint-based threats. Perform L2-level triage and deep-dive analysis using SentinelOne EDR and integrated security tools. Analyze suspicious processes using process tree review and behavioral indicators. Conduct phishing investigations including email header analysis, malicious URL inspection, and attachment sandbox validation. Map attacker techniques to MITRE ATT&CK framework to improve threat detection accuracy. Execute containment actions such as endpoint isolation and IOC blocking. Coordinate with IT and engineering teams for remediation and closure within defined SLA timelines. Maintain detailed investigation documentation in ServiceNow including evidence, RCA, and corrective actions.

Education

Bachelor of Science (B.Sc) – Computers - Aditya Degree College, Palakollu

2014 - 2017 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceFeb 2026

Skills (17)

L2 SOC Operations & Incident Response EDR SentinelOne SIEM Monitoring IBM QRadar Basic Linux Log Analysis False Positive Reduction & Alert Validation Log Analysis SLA-Based Incident Handling & Escalation Management ServiceNow Incident Management +7 more