About
Cybersecurity SOC Analyst with hands-on experience in 24×7 Security Operations Center environments, specializing in security monitoring, alert triage, and incident investigation using SIEM and EDR platforms. Skilled in Splunk, Wazuh, Microsoft Sentinel, Sentinel One, CrowdStrike, Xcitium, and Fortinet firewall analysis. Experienced in IOC investigation, log analysis, threat investigation across malware, phishing, and ransomware scenarios, MITRE ATT&CK mapping, and incident escalation workflows. Experienced in Active Directory administration, vulnerability monitoring, and security operations procedures (SOPs). Seeking to contribute to Security Operations, Threat Detection & Response, and Incident Response in a dynamic cybersecurity environment.
Skills & Expertise (32)
Work Experience
Cybersecurity Analyst
Teksky
Oct 2024 - Apr 2025
Supported SIEM monitoring and vulnerability assessment activities. Worked with Active Directory in a training environment to understand user account management, group policy configuration (GPO), and access control concepts. Conducted basic web security assessments and analyzed security logs using Splunk. Assisted in basic risk assessments and security audit documentation to identify gaps and support compliance activities. Practiced MITRE ATT&CK technique mapping for identified threats.
SOC Analyst L1
Blue Cloud Softech Solutions
May 2025 - Present
Monitored SIEM dashboards and EDR alerts in a 24x7 SOC environment for threat detection and anomaly identification. Performed initial validation, enrichment, and severity classification of security alerts, supporting end-to-end incident resolution in coordination with L2 teams as per SOP. Performed daily review and analysis of security logs across Windows, Linux, firewall, and endpoint telemetry sources to identify anomalies and potential threats. Investigated IOCs including malicious IPs, suspicious processes, lateral movement indicators, and credential misuse. Investigated threats including malware, phishing attempts, ransomware indicators, and DDoS activity patterns using SIEM and EDR telemetry. Worked with Sentinel One, Xcitium, CrowdStrike, Seceon, and Fortinet for endpoint and network threat monitoring. Created and tuned detection rules in Wazuh and Sysmon to enhance visibility and reduce false positives. Documented investigation steps, timestamps, and actions taken within ticketing systems ensuring SLA adherence. Participated in P1/P2 incident response by collecting forensic artifacts and supporting containment coordination. Maintained shift handover logs and collaborated closely with IT, network, and L2/L3 teams to ensure accurate communication and timely incident resolution across all shifts.
Education
Bachelor of Technology, Computer Science Engineering - TKR College of Engineering and Technology
2020 - 2024 · India
Intermediate, MPC - Kristu Jyothi Junior College
2018 - 2020 · India
Certifications
Sentinel One EDR
Sentinel One · 2025
Fortinet NSE 1
Fortinet · 2025
Cisco Ethical Hacker
Cisco · 2024
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Need Sponsorship
Relocation
Depends on Offer
Skills (32)
Click a skill to find developers with the same skill