About
SOC Analyst with 4+ years of experience in Security Operations Center (SOC), Threat Detection, Incident Response, and Threat Intelligence. Skilled in SIEM monitoring, log correlation, alert triage and security incident management using Microsoft Sentinel, Splunk, Q Radar and Arc Sight. Strong knowledge of MITRE ATT&CK framework, Cyber Kill Chain, and NIST incident response lifecycle. Experienced in handling Phishing, Malware analysis, brute-force attacks and insider threats. Adept at improving security posture, reducing false positive and automating detection workflows.
Skills & Expertise (37)
Work Experience
SOC Analyst
Wipro Ltd (Client: Royal Dutch Shell)
Jan 2022 - Feb 2026
Performed real-time security monitoring and log analysis using SIEM tools (Microsoft Sentinel, Splunk, QRadar, ArcSight). Conducted alert triage, event correlation, and incident classification based on severity levels. Investigated phishing attacks, malware infections, ransomware indicators, brute-force attempts, and suspicious logins. Utilized EDR/XDR tools for endpoint investigation and threat containment. Analyzed firewall, proxy, VPN, and authentication logs to detect anomalies. Applied MITRE ATT&CK techniques to map adversary behavior and improve detection use cases. Executed incident response lifecycle (Detection → Analysis → Containment → Eradication → Recovery). Reduced false positives by tuning SIEM correlation rules and use cases. Collaborated with Threat Intelligence teams to enrich alerts with IOC data. Created and maintained incident reports, run books, and SOPs. Participated in threat hunting and vulnerability management activities. Ensured compliance with security policies, audit requirements, and regulatory standards.
Education
b.tech
2008 - 2012 · India