About
Having 4+ years of experience as a SOC Analyst & Security Analyst in 24×7 SOC environments. Experienced in monitoring, detecting, and responding to security incidents using SIEM tools such as Azure Sentinel, Splunk Enterprise, Alert Logic, Microsoft XDR, Azure Active Directory, XSOAR, Qualys Guard VMDR, CrowdStrike EDR, Microsoft Defender, and Mimecast Email Gateway. Also experienced in web application, network, and API penetration testing using Nmap, Burp Suite, Nessus, and Nexpose.
Skills & Expertise (27)
Work Experience
SOC Analyst L1
Wipro – MSSP Environment
Jan 2022 - Present
Monitored and analyzed security alerts using SIEM tools to identify potential threats. Investigated and responded to security incidents following the complete Incident Response lifecycle. Performed log analysis from firewall, endpoint, server, and network devices. Detected and handled malware, phishing, brute-force, and ransomware-related incidents. Tuned SIEM rules to reduce false positives and improve alert accuracy. Conducted IOC analysis using threat intelligence feeds and security tools. Supported endpoint security operations using AV, EDR, and XDR solutions. Coordinated with IT and network teams for incident containment and recovery. Prepared incident reports, RCA documents, and SOC operational reports. Used ServiceNow and Zendesk to track and manage security incidents.
Education
MBA - JNTU University
- 2020 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation