Back to Developers
Guru Kiran

Guru Kiran

Cybersecurity Analyst

Bangalore, India
80
Profile Score

About

Cybersecurity Analyst with 1.6 years of experience in Incident Response. Certified in Splunk Enterprise Security and IBM QRadar, with hands-on experience across security tools including Intrusion Prevention Systems (IPS), antivirus solutions, email security, firewalls, Web Application Firewalls (WAF), and proxy services. Skilled in detecting, analyzing, and responding to security incidents to protect critical organizational infrastructure.

Skills & Expertise (26)

Splunk Enterprise Security (ES) Intermediate
8.2/10
1.6
Years Exp
SIEM Use Cases Intermediate
8.1/10
1.6
Years Exp
Security Operations Intermediate
8.0/10
1.6
Years Exp
Phishing Analysis Intermediate
7.8/10
1.6
Years Exp
Log Analysis Intermediate
7.7/10
1.6
Years Exp
CrowdStrike Falcon MITRE ATT&CK Windows LINUX Jira ServiceNow Cloudflare Microsoft 365 Defender Check Point Fortinet SentinelOne IDS IBM QRadar Proxy IPS Malware Analysis SLA Compliance Security Alert Triage Threat Hunting Endpoint Detection and Response (EDR) Firewall

Work Experience

SOC Analyst

EMTECH SOLUTIONS PRIVATE LIMITED

Sep 2024 - Present

Performed 24×7 SOC monitoring, triaging and investigating high-volume security alerts using Splunk Enterprise Security and IBM QRadar SIEM in line with defined SOC SLAs. Managed and maintained IBM QRadar SIEM, including log onboarding, correlation rule tuning, and alert optimization. Investigated security events across Firewall, WAF, IDS/IPS, Antivirus, Proxy, Email Security, and Endpoint platforms to identify anomalies, policy violations, and potential breaches. Conducted phishing and malicious email investigations by analyzing email headers, URLs, attachments, payloads, and file hashes for rapid threat containment. Handled EDR/XDR incidents using CrowdStrike Falcon, SentinelOne, and Microsoft Defender, performing alert analysis, host investigation, containment, and escalation. Analyzed and correlated Indicators of Compromise (IOCs) including IPs, domains, URLs, and hashes using threat intelligence feeds to enhance proactive threat detection. Applied the MITRE ATT&CK framework to map adversary TTPs, improving detection accuracy and strengthening SOC coverage. Tuned SIEM correlation rules and detection logic, reducing false positives by 25% and improving analyst efficiency and response time. Supported the full incident response lifecycle including investigation, containment, eradication, and recovery in collaboration with IT and infrastructure teams. Generated daily, weekly, and monthly SOC reports, including incident summaries, root cause analysis (RCA), and remediation recommendations. Blocked malicious IPs, URLs, and domains using proxy and network security controls to prevent access to harmful resources. Maintained audit-ready incident documentation, timelines, and security briefings for management and client stakeholders.

Education

Electrical and Electronics Engineering - Shri Siddhartha Institute of Technology

2021 - 2024 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceFeb 2026

Skills (26)

Splunk Enterprise Security (ES) SIEM Use Cases Security Operations Phishing Analysis Log Analysis CrowdStrike Falcon MITRE ATT&CK Windows LINUX Jira +16 more