About
SOC L1 Analyst with 3 years of experience in 24x7 security monitoring, alert triage, and initial incident investigation. Hands-on experience with SIEM tool such Splunk for real-time event monitoring and log analysis. Skilled in identifying phishing, malware, brute-force, and account compromise incidents through analysis of logs from firewalls, EDR, email gateways, Windows/Linux systems, DNS, and proxy devices. Proficient in IOC analysis, MITRE ATT&CK mapping, incident documentation, and SLA-based escalation using ServiceNow. Detail-oriented team player with strong analytical skills and a continuous learning mindset.
Skills & Expertise (43)
Work Experience
Cyber Security Analyst L-1
SEQURTEK PVT LTD
Dec 2024 - Present
Monitored, analyzed, and triaged security alerts generated from SIEM platform Splunk to identify potential security threats and incidents in a 24x7 SOC environment. Performed end-to-end incident handling, including alert investigation, validation (true/false positive), root cause analysis (RCA), containment actions, and escalation to L2/L3 teams in accordance with defined SLAs and SOPs. Investigated and responded to a wide range of security incidents including phishing attacks, malware infections, brute-force attempts, account compromises, data exfiltration indicators, and suspicious network activities. Analysed logs from multiple security and infrastructure sources such as firewalls, EDR/XDR solutions, email security gateways, Windows Event Logs, DNS logs, VPN logs, proxy logs, and IDS/IPS devices to identify attack patterns and anomalies. Conducted email security analysis, including email header analysis, malicious URL investigation, attachment sandboxing, and remediation actions such as blocking malicious senders, domains, URLs, and IPs at email gateways, firewalls, and proxy devices.
Cyber Security Analyst L-1
Accenture
Oct 2022 - Nov 2024
Monitored and triaged security alerts in a 24×7 SOC environment using Splunk SIEM to identify and respond to threats. Executed end-to-end incident response, including investigation, validation, root cause analysis, containment, and escalation as per SLAs/SOPs. Investigated incidents such as phishing, malware, brute-force attacks, account compromises, and suspicious network activities. Analysed logs from firewalls, EDR/XDR, email gateways, Windows, DNS, VPN, proxy, and IDS/IPS systems to detect anomalies. Performed email threat analysis (headers, URLs, attachments) and implemented remediation actions like blocking malicious indicators.
Education
Bachelor of Banking & Insurance - Mumbai University
- 2023 · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Skills (43)
Click a skill to find developers with the same skill