About
No bio added yet
Skills & Expertise (26)
Work Experience
Information Security Analyst
InfoDeal Technologies
Oct 2020 - May 2024
Utilized SIEM, IPS, CrowdStrike, and EDR tools to monitor and analyze cybersecurity events, ensuring proactive detection and mitigation of threats & penetration testing. Conducted detailed malware analysis and investigated malicious domains, phishing emails, and IPs using open-source tools. Implemented blocking measures after thorough evaluation. Investigated and resolved potential security incidents, distinguishing between true and false positives. Responded to incidents with advanced EDR Surface Reduction solutions and documented findings and mitigations. Supported security teams such as CTI and TechOps using ticketing tools like ServiceNow and JIRA. Escalated complex incidents to senior analysts as needed. Performed in-depth security analysis using Firewall (Palo Alto) and EDR tools to monitor real-time network traffic and mitigate vulnerabilities. Managed alert handling playbooks, created and maintained runbooks, and tested connector integrations to streamline response workflows. Conducted vulnerability assessments using tools like Tenable to identify and address organizational security gaps. Designed and developed in-house solutions for monitoring and identifying malicious activities. Created tailored analytical dashboards based on collected security logs to enhance client reporting.
Information Security Analyst
Rockwell Automation
May 2025 - Dec 2025
Prevented, detected, triaged, and responded to cybersecurity incidents across endpoint, network, and cloud environments using SIEM, EDR, and firewall telemetry. Led incident investigations end-to-end, including containment, eradication, recovery, and Root Cause Analysis (RCA) with post-incident documentation. Conducted after-action reviews (AARs) and provided actionable remediation recommendations to prevent recurrence. Investigated security alerts and logs from SIEM (Splunk/Sentinel-style), firewalls, servers, and endpoints to identify attacker TTPs. Fine-tuned SIEM correlation rules and detection logic to reduce false positives and improve detection accuracy. Developed and updated SIEM use cases aligned with MITRE ATT&CK techniques. Performed advanced endpoint investigations using CrowdStrike/EDR, including attack surface reduction and behavioural analysis. Analysed real-time network traffic using Palo Alto Firewalls, NetFlow, and protocol-level knowledge (DNS, HTTP, SMB). Conducted malware analysis and phishing investigations using OSINT tools; blocked malicious IPs, domains, and URLs. Collaborated with Threat Intelligence teams to track emerging threats and update detection and response strategies. Supported forensic investigations by collecting and preserving evidence from compromised systems. Mapped attacker behaviour using Cyber Kill Chain and MITRE ATT&CK frameworks. Created, maintained, and executed incident response playbooks and SOC runbooks. Designed in-house monitoring solutions and dashboards for improved visibility and executive reporting. Worked cross-functionally with CTI, TechOps, and CSIRT teams using ServiceNow and JIRA; escalated complex incidents when required.
Information Security Analyst
IQZ Systems Pvt Ltd
Aug 2024 - Dec 2024
Conducted comprehensive root cause analyses to identify security vulnerabilities and provided actionable risk mitigation recommendations. In order to monitor network traffic in real time and address vulnerabilities, a thorough security investigation was conducted utilizing the Palo Alto firewall and EDR technologies. Performed vulnerability assessments to find and fix organizational security flaws using tools such as Tenable. Effectively responded to security incidents by adhering to established incident response procedures and leveraging SOC playbooks for consistent handling. Analyzed logs from diverse sources, including firewalls and servers, to identify anomalies and detect potential threats, improving the organization's security posture. Fine-tuned SIEM correlation rules to minimize false positives and enhance the accuracy of threat detection mechanisms. Participated in forensic investigations of compromised systems, ensuring proper evidence collection and contributing to post-incident reporting. Threat Intelligence Integration: Collaborated with threat intelligence teams to monitor emerging threats and update detection mechanisms to stay ahead of evolving attack vectors. Contributed to developing and maintaining SOC playbooks and knowledge base articles, improving operational efficiency and knowledge sharing.
Education
M. S. in Mechanical Engineering - DE Montfort University
2019 - 2020 · United Kingdom
B. E. in Mechanical Engineering - Pune University
2014 - 2017 · India
Diploma in Mechanical Engineering - Maharashtra State Board of Technical Education
2011 - 2014 · India
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Relocation
Open to Relocation
Skills (26)
Click a skill to find developers with the same skill