Back to Developers
Hrithik S

Hrithik S

Security Operations Analyst

Mysore, Karnataka 5+ yrs exp 90 · Outstanding

About

L2 SOC Analyst with 5+ years of hands-on experience in Security Operations Center (SOC) and MSSP environments, specializing in threat detection, incident response, triage, and escalation. Proficient in SIEM/EDR, cloud security monitoring (AWS, Azure, GCP), use case development, and threat hunting. Demonstrated track record of reducing false positives, building detection coverage and maintaining SLA compliance in high-volume, multi-client environments.

Skills & Expertise (33)

Threat Detection Advanced
8.6/10
4
Years Exp
Incident Response Advanced
8.4/10
4
Years Exp
AWS Intermediate
7.2/10
2
Years Exp
Azure Intermediate
7.2/10
2
Years Exp
GCP Intermediate
6.8/10
2
Years Exp
Cyber Kill Chain IOC OWASP Top 10 Runbook Development SOP Documentation Malware Analysis Phishing Investigation Sumo Logic SentinelOne EDR Microsoft Sentinel ArcSight ServiceNow Jira SPL MITRE ATT&CK framework Wiz Rapid7 Nexpose Vulnerability Management KQL use case development Ioa analysis IOC Analysis Anomaly Detection Threat Hunting RCA Containment escalation Triage

Work Experience

Associate L2 – SOC

Publicis ReSources

May 2024 - Present

Lead real-time monitoring, triage, and investigation of security alerts across 10+ log sources. Developed and deployed custom correlation rules and use cases across diverse log sources in Sumo Logic and SentinelOne EDR - including raw log parsing to meet audit requirements. Fine-tuned alert thresholds and detection logic, reducing false positives by ~35% and significantly cutting alert fatigue. Conduct proactive threat hunting to identify anomalies, IOCs, and attack patterns within the network environment. Perform root cause analysis (RCA) on confirmed incidents and coordinate with cross-functional teams for containment, remediation, and recovery. Monitored and responded to cloud security risks, misconfigurations and threat detections using Wiz. Conducted global vulnerability scans using Rapid7 Nexpose to identify CVE exposure across assets; reported affected devices for timely remediation. Generate compliance and performance reports aligned with customer SLAs; maintain and update SOPs. Review and enrich incidents raised by L1 analysts with detailed analysis and supplementary findings.

Associate Engineer – SOC

Atos

Jul 2021 - Apr 2024

Monitored and investigated security events across enterprise environments using Microsoft Sentinel and ArcSight. Responded to phishing, malware, and intrusion incidents by following escalation procedures and runbooks; coordinated with L3 and client teams for resolution. Handled customer ad-hoc requests, fulfilled audit requirements, and circulated threat digests highlighting global threat landscape developments. Contributed to use case development and alert tuning across Microsoft Sentinel and ArcSight. Prepare SIEM and Logger health performance reports; maintain asset tracker and coordinate with SIEM admin for troubleshooting.

SOC Engineer

Paladion Networks (Payroll: Ahana Systems)

Oct 2020 - Jun 2021

Performed L1 security monitoring and reporting for MSSP clients across varied industry verticals. Investigated alerts from ArcSight SIEM, correlated logs across multiple sources, and escalated confirmed incidents following defined compliance. Follow-up with clients on faster incident closure; Update and maintain security incident trackers. Assisted in developing SOPs and contributed to shift handover documentation to ensure continuity of operations.

Education

Bachelor of Computer Applications (BCA) - University of Mysore

2017 - 2020 · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 15/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 90/100

Profile Overview

Member sinceMay 2026