About
Cybersecurity professional with 5+ years of experience in SOC operations and Cyber Threat Intelligence, currently working as a Sr. Technical Analyst at Hexaware Technologies. Experienced in security monitoring, incident response, and threat detection using tools such as QRadar, EventTracker, ExaBeam, Azure Sentinel. Skilled in delivering actionable intelligence through IOC/CVE analysis, MITRE ATT&CK mapping, and OSINT research for real-time threat detection and response.
Skills & Expertise (22)
Work Experience
Senior Security Analyst
Hexaware Technologies
Jun 2024 - Present
Monitored and triaged security alerts from SIEM, EDR and email security platforms to identify and respond to potential security incidents. Performed in-depth investigation and analysis of security incidents including phishing attacks, malware infections, brute-force attempts, suspicious user activities, and potential data exfiltration. Conducted log analysis across endpoints, network devices, and email gateways to determine attack vectors, scope, and impact of security incidents. Performed IOC enrichment and correlation using threat intelligence platforms such as OpenCTI, VirusTotal, AbuseIPDB, and ThreatFox to identify malicious indicators. Analyzed phishing emails through header analysis, URL inspection, attachment sandboxing, and reputation checks using tools like URLscan.io, Cisco Talos, and VirusTotal. Enriched and validated Indicators of Compromise (IOCs) including malicious IP addresses, domains, file hashes, and URLs using OSINT and commercial threat intelligence feeds. Mapped attacker Tactics, Techniques, and Procedures (TTPs) to the MITRE ATT&CK framework to support threat detection and threat hunting activities. Created and maintained incident tickets in ServiceNow, ensuring proper documentation, investigation notes, and escalation procedures were followed. Created weekly and monthly reports analyzing adversary behavior, evolving techniques, and geographic targeting trends. Supported vulnerability management teams by providing threat intelligence context for high-risk CVEs, including exploitation status and threat actor activity. Produced threat intelligence reports and security advisories highlighting emerging threats, active campaigns, and relevant IOCs for proactive defense. Participated in shift handovers and knowledge sharing, ensuring seamless communication of ongoing investigations and critical incidents.
Security Analyst
Netsurion Technologies Private Limited
Apr 2021 - Jun 2024
Monitored security alerts from SIEM and other security tools to detect suspicious activities. Performed initial analysis of alerts to identify potential security incidents such as phishing, malware, and unauthorized access. Investigated basic security events by reviewing logs from systems, networks, and endpoints. Escalated confirmed or high-severity incidents to senior analysts (L2/L3) according to defined procedures. Created and updated incident tickets in ServiceNow with investigation details. Checked suspicious IPs, domains, and file hashes using threat intelligence tools like VirusTotal. Assisted in phishing email analysis by reviewing email headers, links, and attachments. Monitored security dashboards and ensured alerts were handled within the defined SLA. Documented investigation steps and findings for future reference. Fine-tuned SIEM use cases in coordination with client POCs to reduce false positives and improve detection accuracy. Participated in shift handovers to ensure smooth SOC operations.
Education
Bachelor of Engineering in Computer Science - Anna University
- 2018 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation