Back to Developers
Ganga Manish.K

Ganga Manish.K

SOC Analyst

1+ yrs exp 84 · Excellent

About

SOC Analyst with 2 years of hands-on experience in a live Security Operations Center, monitoring SIEM dashboards, triaging and investigating security alerts, and executing incident response across endpoint, identity, and network environments. Proficient in Splunk, CrowdStrike Falcon, and Microsoft Defender XDR. Skilled in phishing investigation, log correlation (OSI L3–L7), MITRE ATT&CK mapping, and false-positive tuning. Holds CompTIA Security+ and Microsoft SC-200 certifications. Seeking an L1/L2 SOC Analyst role to deepen DFIR and threat hunting capabilities.

Skills & Expertise (56)

SIEM Monitoring Intermediate
8.0/10
2
Years Exp
Splunk Intermediate
7.8/10
2
Years Exp
Incident Handling Intermediate
7.5/10
2
Years Exp
Threat Detection Intermediate
7.3/10
2
Years Exp
CrowdStrike Falcon Intermediate
7.2/10
2
Years Exp
IOC Analysis Windows MITRE ATT&CK framework Evidence Collection timeline analysis Digital Forensics Basics Root Cause Analysis incident triage Email Security Gateways WAF VPN Proxy IPS Threat intelligence feeds Behavioral Analysis Firewall Logs LINUX Active Directory Cloud Platforms Python PowerShell SOAR Playbooks Security Automation Authentication Authorization MFA IOC Alert Triage Log Analysis Use Case Tuning False Positive Reduction SOC playbooks SLA Management log correlation Event Analysis Dashboard Monitoring Microsoft Defender XDR Endpoint Investigation Process Analysis IDS TCP IP DNS HTTP HTTPS SSL TLS OSI Layers Packet Analysis Network traffic monitoring Firewalls

Work Experience

SOC Analyst

Sadup Softech

Jun 2024 - Present

Monitored SIEM dashboards (Splunk) in a live SOC, triaging 50+ security alerts daily across endpoint, identity, and network environments to maintain CIA triad integrity. Investigated phishing emails end-to-end — analyzing SPF/DKIM/DMARC headers, URLs, and attachments — reducing mean time to detect (MTTD) for email-based threats. Performed log analysis correlating events across OSI layers (L3–L7) from firewalls, proxies, servers, and cloud platforms (AWS/Azure) to surface anomalous behavior. Triaged and validated alerts from CrowdStrike Falcon and Microsoft Defender XDR, escalating confirmed incidents per SOPs and reducing false-positive rate through alert rule tuning. Conducted basic threat hunting using MITRE ATT&CK framework, identifying IOCs and suspicious user/network behavior before escalation to senior analysts. Supported DFIR investigations by collecting evidence, enriching alerts with threat intelligence feeds, and assisting in timeline analysis and root cause analysis (RCA). Analyzed endpoint activity using EDR tools — process execution trees, file changes, and persistence mechanisms — across Windows and Linux environments. Documented all incidents with accurate ticket updates and post-incident reports for audit and compliance requirements, maintaining SLA adherence. Collaborated with network, system, and application teams to remediate vulnerabilities and implement fixes aligned with Zero Trust principles.

Education

Bachelor of Technology - SV College Of Engineering

- 2024 · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 9/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 84/100

Profile Overview

Member sinceMay 2026

Availability Details

Visa Status

H1B

Relocation

Open to Relocation