About
SOC Analyst with 2+ years of hands-on experience in cybersecurity operations and enterprise security environments. Performed L1 security event monitoring, triage, and initial incident investigation. Analyzed phishing, spam, and malicious email campaigns using secure email gateways and threat intelligence tools. Monitored and managed security event queues for timely detection and response. Supported SIEM-based workflows for log analysis, alert correlation, and incident escalation. Conducted basic threat analysis and malware behavior assessment. Assisted in vulnerability assessment and remediation tracking processes. Worked with IAM workflows, including access reviews and role-based controls. Generated governance, compliance, and operational security reports. Strong knowledge of Linux, Windows, Python, Azure, Cosmos, SOC, SIEM, EDR.
Skills & Expertise (26)
Work Experience
Cloud Security Engineer
LTIMindtree (Client: Microsoft)
Mar 2024 - Present
Analyze, categorize, and detect suspicious email samples using header analysis, CTAs, domain reputation, SPF/DKIM/DMARC. Monitor incoming threat and event queues in SOC-style operations. Fine-tune ML-based detections to improve accuracy. Investigate phishing, spam, and fraud attempts. Document incidents, IOCs, and investigation findings.
Education
Bachelor of Technology (B.Tech) - Vellore Institute of Technology, Bhopal
2019 - 2023 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Need Sponsorship
Relocation
Open to Relocation