About
Senior SOC L2 Analyst and Vulnerability Management Administrator with 4+ years of experience in security incident detection, triage, investigation, and response within a large enterprise managed security services environment. Supports Zoetis, a global animal health and pharmaceutical company, as the primary client within a multi-client delivery model. Acts as the escalation point for incident and vulnerability decisions, coordinating remediation across infrastructure, application, and third-party vendor teams. Consistently maintains 99%+ SLA compliance across all incident severity levels.
Skills & Expertise (23)
Work Experience
Senior Associate Consultant – (SOC L2 Analyst)
Infosys Ltd
Dec 2021 - Present
Acts as L2 SOC Analyst and client-facing escalation point for security incidents, consistently maintaining 99%+ SLA compliance across all severity levels. Monitored and analyzed security alerts across Splunk, CrowdStrike NGSIEM, and Palo Alto Panorama firewall logs, investigating phishing, malware infections, insider threats, suspicious logins, and anomalous network behavior. Performed in-depth endpoint, cloud, and DLP investigations using CrowdStrike Falcon, Broadcom DLP, Netskope, Microsoft O365 Security, and Azure Security Center, identifying data exfiltration, policy violations, and compromised accounts. Investigated Azure Security Center alerts for suspicious logins, anomalous API activity, and identity-based threats across cloud workloads, escalating and remediating confirmed incidents. Detected and investigated phishing campaigns and Business Email Compromise (BEC) attacks using Proofpoint TAP/TRAP and Abnormal Security; performed email header analysis, SPF/DKIM/DMARC validation, and O365 audit log forensics. Conducted vulnerability assessments across 27,000+ endpoints and 60+ DMZ-facing applications using Tenable Nessus and HCL AppScan; triaged findings by CVSS severity and coordinated remediation with infrastructure and application teams. Assessed external attack surface exposure using BitSight and Shodan, reducing open external security findings from 635 to under 20. Mapped security incidents and attacker techniques to the MITRE ATT&CK framework to improve detection coverage and response strategies. Created detailed incident reports, Knowledge Books, threat intelligence summaries, and root cause analyses to support management, audit requirements, and client stakeholders. Coordinated with multiple external managed security vendors and internal cross-functional teams across infrastructure, application, and network domains for incident and vulnerability remediation. Optimized an infrastructure vulnerability management automation script, reducing execution time from 6–7 hours to 15–20 minutes, enabling faster identification and remediation of critical vulnerabilities. Mentored 15+ L1 SOC analysts through knowledge-sharing sessions and live case reviews, improving alert escalation accuracy from 75% to 90%.
Education
Master of Computer Applications - Guru Gobind Singh Indraprastha University (GGSIPU)
- 2021 · Afghanistan
Bachelor of Computer Applications - Babu Banarasi Das University (BBDU)
- 2018 · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Skills (23)
Click a skill to find developers with the same skill