Back to Developers
gangaiah Giriboyina

gangaiah Giriboyina

SOC Analyst

Hyderabad, India
80
Profile Score

About

SOC Analyst with 4+ years of experience in Security Operations Center (SOC), Threat Detection, Incident Response, and Threat Intelligence. Skilled in SIEM monitoring, log correlation, alert triage and security incident management using Microsoft Sentinel, Splunk, Q Radar and Arc Sight. Strong knowledge of MITRE ATT&CK framework, Cyber Kill Chain, and NIST incident response lifecycle. Experienced in handling Phishing, Malware analysis, brute-force attacks and insider threats. Adept at improving security posture, reducing false positive and automating detection workflows.

Skills & Expertise (37)

Microsoft Sentinel Advanced
8.8/10
4
Years Exp
EDR Advanced
8.6/10
4
Years Exp
Splunk Advanced
8.4/10
4
Years Exp
IBM QRadar Advanced
8.4/10
4
Years Exp
ArcSight Advanced
8.4/10
4
Years Exp
Root Cause Analysis SIEM (Security Information and Event Management) Containment & Remediation MITRE ATT&CK NIST ISO 27001 Cyber Kill Chain TCP/IP DNS DHCP Routing & Switching Windows LINUX PowerShell Python Cyber Security Analysis escalation incident triage Behavioral Analysis IOC Analysis Threat Hunting Proxy VPN IDS/IPS Palo Alto Fortinet Firewalls SOAR Antivirus Microsoft Defender for Endpoint XDR log correlation

Work Experience

SOC Analyst

Wipro Ltd (Client: Royal Dutch Shell)

Jan 2022 - Feb 2026

Performed real-time security monitoring and log analysis using SIEM tools (Microsoft Sentinel, Splunk, QRadar, ArcSight). Conducted alert triage, event correlation, and incident classification based on severity levels. Investigated phishing attacks, malware infections, ransomware indicators, brute-force attempts, and suspicious logins. Utilized EDR/XDR tools for endpoint investigation and threat containment. Analyzed firewall, proxy, VPN, and authentication logs to detect anomalies. Applied MITRE ATT&CK techniques to map adversary behavior and improve detection use cases. Executed incident response lifecycle (Detection → Analysis → Containment → Eradication → Recovery). Reduced false positives by tuning SIEM correlation rules and use cases. Collaborated with Threat Intelligence teams to enrich alerts with IOC data. Created and maintained incident reports, run books, and SOPs. Participated in threat hunting and vulnerability management activities. Ensured compliance with security policies, audit requirements, and regulatory standards.

Education

b.tech

2008 - 2012 · India

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Skills (37)

Microsoft Sentinel EDR Splunk IBM QRadar ArcSight Root Cause Analysis SIEM (Security Information and Event Management) Containment & Remediation MITRE ATT&CK NIST +27 more