About
SOC Analyst with 3 years of experience at Capgemini, specializing in security monitoring, alert triage, and incident response. Hands-on experience with SIEM tools, endpoint security, email threat analysis, and vulnerability management in enterprise environments. Strong understanding of network security, logs, and attack vectors, with the ability to collaborate effectively with cross-functional teams.
Skills & Expertise (8)
Work Experience
Security Analyst L1
Capgemini
Mar 2023 - Present
Worked in a 24×7 Security Operations Center monitoring security alerts and events using Splunk SIEM. Performed alert triage and investigation for security incidents including phishing attacks, malware infections, suspicious logins, and malicious network connections. Investigated security alerts from endpoint detection tools such as Microsoft Defender for Endpoint and CrowdStrike Falcon to identify malicious processes and suspicious activities. Conducted phishing email investigations using Mimecast by analyzing email headers, URLs, attachments, and user-reported emails. Analyzed logs from multiple security sources including SIEM, EDR, firewall, proxy, and email security tools to identify potential threats. Reviewed vulnerability scan reports from Qualys and supported remediation tracking with internal teams. Managed security incidents using ServiceNow including incident creation, investigation updates, escalation to L2/L3 teams, and SLA tracking. Performed basic identity security investigations using Azure Active Directory such as suspicious login activity and user access verification. Documented investigation findings and prepared incident reports for security events.
Education
B.Tech – Computer Science and Engineering - D.Y. Patil College of Engineering and Technology
2019 - 2023 · Afghanistan
Certifications
Virtual Internship
Palo Alto Cyber security Academy · 2022
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Need Sponsorship
Relocation
Depends on Offer