Back to Developers
CK

Chandni Kumari

Cyber Security Analyst 2

Bangalore, India
59
Profile Score

About

Results-driven SOC Analyst with 5 years of hands-on experience in threat detection, incident response, and threat intelligence operations. Expertise in phishing analysis, log investigation, and SIEM monitoring (Splunk) combined with advanced skills in Proofpoint TAP/TRAP/CLEAR and Microsoft Defender EDR.

Skills & Expertise (4)

Incident Management Threat Intelligence Proxy DDoS

Work Experience

SOC Analyst 2

Digital Harbor

09-2022 - 02-2023

Monitor and investigate security alerts generated from Splunk SIEM. Analyze a variety of network and host-based security logs (Firewalls, Proxy, IPS, windows, servers etc.) to determine the correct remediation actions and escalation paths for each incident. Ensure proactive blocking of latest IOCs and perform daily log analysis based on global advisories. Optimize security operations by performing trend analysis, reducing false positives, and fine-tuning detection rules. Proficient in analyzing suspicious emails/files (.doc, .xlsx, .pdf, .exe).

SOC Analyst

Propelld

06-2020 - 03-2022

Handled spam/phishing emails and analyzed malicious files (e.g., DOC, Excel, PDF, EXE). Maintained incident documentation, analyzed incident trends, and shared structured reports with customers. Assisted in developing processes and procedures to improve incident response times, incident analysis, and SOC functions. Monitored security alerts in mailbox, created incidents and added preliminary investigation details, to be escalated to L2. Sent security awareness emails to users regarding cyber-attacks and performed cyber drills related to spam/phishing emails.

Cyber Security Analyst 2

Gyansys Infotech

04-2023 - Present

Monitor and investigate security alerts generated from Splunk SIEM and Microsoft Defender EDR. Create and customize Splunk dashboards and schedule reports to automate security monitoring to improve incident response efficiency. Analyze phishing emails reported by end-users, ensuring rapid containment and remediation. Analyze user sign-in events using Azure AD logs to detect anomalies, investigate unauthorized access attempts, and support incident response activities. Apply MITRE ATT&CK framework to guide and enhance security incident investigations. Ensure proactive blocking of reported IOCs and conduct comprehensive log analysis across security devices in line with global threat advisories. Investigate security incidents, perform root cause analysis, recommend remediation/containment measures and prepare RCA for high priority/Critical incidents to share with customers. Conduct incident trend analysis, remediate false positives, and fine-tune rules to optimize SOC operations. Respond to EDR alerts from Microsoft Defender, isolate endpoints and mitigate malware threats. Document incident cases, root cause analysis, and provide insights to improve SOC playbooks.

Security Analyst

Capgemini

04-2022 - 09-2022

Monitor and investigate security incidents detected by SIEM solution to identify and mitigate potential threats. Analyze logs from various sources to detect anomalies and malicious activity. Efficiently analyze Spam/phishing mails reported by users and analyze suspicious files (.doc, .xlsx, .pdf, .exe etc). Communicate frequently with clients, followed established methodologies, and created/presented clear and concise deliverables. Developed reports on incident trends, enabling management to strengthen email security policies.

Interested in this developer?

Profile Score Breakdown

📷 Photo 0/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 9/20
🎓 Education 0/10
⏱️ Experience 15/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 59/100

Profile Overview

Member sinceSep 2025

Availability Details

Visa Status

No Visa

Relocation

Open to Relocation

Skills (4)

Incident Management Threat Intelligence Proxy DDoS