Back to Developers
Gayathri G

Gayathri G

Security Operations Center (SOC) Analyst

India
80
Profile Score

About

Having 6+ years’ experience in cybersecurity as a Security Operations Center (SOC) analysis, Proven ability to identify, investigate, and respond to security threats in a fast-paced environment. Skilled in network security monitoring, incident response, and threat hunting. I have excellent analytical and problem-solving skills with a strong understanding of cybersecurity best practices.

Skills & Expertise (27)

Microsoft Azure Sentinel Expert
9.1/10
6
Years Exp
Microsoft Defender for Endpoint Advanced
8.6/10
6
Years Exp
Kusto Query Language Advanced
8.4/10
6
Years Exp
Documentation and Reporting Microsoft E5 Security Products Ticket Management Tools Email Phishing Analysis Threat Hunting Carbon Black Cisco AMP endpoint detection and response Tcpdump WIRESHARK IDS/IPS VPN TCP/IP Networking Forensic Analysis playbook development Incident Response Snort IDS Azure Sentinel SIEM Microsoft Defender for O365 Microsoft Cloud App Security Microsoft Azure Security

Work Experience

System Administrator Intern

University of the Cumberlands

Aug 2023 - Aug 2024

Supported daily IT operations by troubleshooting and resolving technical issues across campus computer labs, faculty offices, and student resource centers, ensuring minimal disruption to university services. Documented system configurations, updates, and troubleshooting processes, creating comprehensive guides to streamline onboarding for future interns and support staff. Participated in security audits, data backup, and disaster recovery planning to safeguard critical university data and maintain compliance with data protection policies.

SOC Operations Consultant (Contractor)

Uber Technologies Inc

Aug 2017 - Apr 2020

Assist with the development of processes and procedures to improve incident response times, analysis of incidents, and overall, SOC functions. Document all activities during an incident and provide leadership with status updates during the life cycle of the incident. Analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident. Communicate with Client and Customer on Incidents and Events. Delivering Detailed Reports to Internal Team, Clients, and Business. Monitor and Respond to all Critical SLA Production Events. Create and maintain operational reports for Key Performance Indicators and weekly and Monthly Metrics. Follow the Vulnerability Management Life Cycle to make sure all Vulnerabilities are reported to Penetration Testing Team. Provided day-to-day support to system users, educating employees on troubleshooting and problem-solving protocols.

SOC Analyst – Mission Control

Open Systems

Apr 2020 - Dec 2022

Monitor the XDR Alerts from Mission Control Portal to Respond to {NDR + MDR + EDR} Alerts and proactively give verdict after Complete Incident Investigation. Monitoring real-time security events on SIEM (Azure Sentinel) console and event analysis and investigating and mitigation. Monitor Alerts from various Security Solution such as Microsoft Cloud App Security, Microsoft Defender for Endpoint and Network Detection Portal – MC [Snort IDS]. Analyze and investigate the alerts in SOC monitoring tools to report any abnormal behaviors, suspicious activities, traffic anomalies, malicious activities, unauthorized access etc. Contacting the customers directly in case of high-priority incidents and helping the customer in the process of mitigating the attacks. Writing KQL queries in Azure Sentinel for analyzing the incidents. Escalating the security incidents based on the client's SLA for the real-time alerting, response, and providing information by doing an in-depth analysis of event payload, security logs and providing recommendations which in turn makes the customer business safe and secure. Working on Endpoint security and Response tools by evaluating them to identify risks and track findings for mitigating risk and remediation of Threats and Malware by analyzing the detections and correlating with dynamic analysis results from the sandbox tools and removing from the machine based on analysis report and performing vulnerability Assessment. Threat Hunting: Proactively searching IOCs on various TI’s and hunting those IOCs in the client environment. Email Analysis: Perform detailed Phishing Email Analysis and extract critical header info and report the verdict with classification if the Email was Phish or Spam or Legitimate.

Education

Master of Science in Information System Security - University of the Cumberland’s

- · Afghanistan

Bachelors in Electronics and Communication Engineering - BVC Engineering College

- · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Skills (27)

Microsoft Azure Sentinel Microsoft Defender for Endpoint Kusto Query Language Documentation and Reporting Microsoft E5 Security Products Ticket Management Tools Email Phishing Analysis Threat Hunting Carbon Black Cisco AMP +17 more