About
Results-driven Security Analyst with 3 years of hands-on experience at NTT Data in Security Operations Center (SOC) environments. Proven expertise in real-time threat monitoring, incident detection and response, SIEM management, and vulnerability assessment. Skilled in triaging security alerts across L1 and L2 functions, conducting log analysis, and coordinating incident remediation using industry-standard frameworks (MITRE ATT&CK, NIST, Cyber Kill Chain). Adept with leading security platforms including Microsoft Sentinel, IBM QRadar, Splunk, CrowdStrike Falcon, and Microsoft Defender for Endpoint. Committed to proactively identifying and neutralizing cyber threats to protect enterprise infrastructure.
Skills & Expertise (44)
Work Experience
Security Analyst – SOC
NTT Data
May 2023 - Present
Monitored and triaged 100+ security alerts daily using Microsoft Sentinel, IBM QRadar, and Splunk SIEM platforms, classifying incidents by severity and initiating appropriate escalation workflows. Investigated and responded to security incidents including malware infections, phishing attacks, unauthorized access, brute-force attempts, and lateral movement activity. Performed Level 1 and Level 2 analysis on correlated SIEM alerts, reducing false positive rates by approximately 30% through refined detection rules and custom use cases. Executed incident response playbooks aligned with NIST SP 800-61 and organizational SOPs, ensuring consistent and timely containment of threats. Coordinated with L3 analysts and threat intelligence teams for advanced threat investigation and root cause analysis of high-priority incidents.
Education
Bachelor of Technology (B.Tech) – Computer Science & Engineering - P.A. College of Engineering and Technology
2019 - 2023 · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation
Skills (44)
Click a skill to find developers with the same skill