Back to Developers
karthik akula

karthik akula

SOC Analyst

Hyderabad, India
80
Profile Score

About

SOC Analyst with 3.5+ years of experience in 24×7 Security Operations Centers, specializing in SIEM monitoring, alert triage, EDR/XDR investigations, incident response, phishing & malware analysis, and identity security. Hands-on expertise with Microsoft Sentinel, IBM QRadar, Forti SIEM, Microsoft 365 Defender, CrowdStrike, and Sentinel One. Strong understanding of MITRE ATT&CK, IOC analysis, and SLA-driven SOC operations.

Skills & Expertise (16)

SIEM Tools: Azure Sentinel Advanced
8.3/10
2
Years Exp
EDR/XDR: Microsoft Defender Advanced
7.8/10
2
Years Exp
Email Security: Microsoft 365 Defender (EOP) Advanced
7.6/10
2
Years Exp
IBM QRadar Forti SIEM Google Chronicle CrowdStrike Falcon Sentinel One OSNIT: Virus Total Abuse IPDB IP Void URLScan.io ANY.RUN Frameworks: MITRE ATT&CK Cyber Kill Chain ITSM Tool – Alpha and My shift

Work Experience

Security Analyst

Cloud4C Services Pvt. Ltd.

Oct 2024 - Present

Worked in a 24×7 SOC environment, monitoring, triaging, and responding to 30–50 security alerts per shift using Microsoft Sentinel, Microsoft 365 Defender, IBM QRadar, and Forti SIEM, ensuring 100% SLA compliance. Investigate EDR/XDR alerts from Sentinel One and CrowdStrike, analyzing hashes, command-line arguments, file paths, IPs, domains, and geolocation to validate true positives and reduce false positives. Perform phishing and email security investigations using Microsoft 365 Defender (EOP) by analyzing headers, attachments, URLs, and sender reputation. Conduct static and dynamic malware analysis, identifying malicious indicators and providing manual remediation guidance when automated containment is not triggered. Detect and respond to brute-force attacks and suspicious authentication attempts by correlating SIEM alerts with Azure AD and identity logs. Investigate malicious IPs matched against IOCs, analyze firewall/proxy actions (deny, drop, reset), review bytes transferred, and block IPs exhibiting abnormal or suspicious behavior. Analyze Azure AD sign-in logs, identifying disabled accounts, anomalous locations, unfamiliar devices, and impossible travel events. Participate in major incident bridge calls, assist with root cause analysis (RCA), and support post-incident reporting and documentation.

Associate Security Analyst

SenSen Networks

May 2021 - Feb 2024

Worked as part of a Security Operations Center (SOC), monitoring and investigating alerts using IBM QRadar SIEM. Performed real-time alert monitoring, triage, and initial investigation in accordance with SLA and SOP requirements. Investigated Windows security events, including user account creation, deletion, and privilege escalation. Analyzed authentication-related alerts, including multiple failed logins attempts and suspicious logins. Monitored network security events, including firewall allow/deny actions, WAF-blocked requests, and malicious IP activity. Reviewed network traffic logs and executed response actions, including blocking malicious IP addresses. Investigated abnormal data transfer events to identify potential data exfiltration or compromised systems. Documented incidents and prepared incident reports, daily SOC reports, and weekly/monthly security reports for audits and management.

Education

Bachelor of Technology (Mechanical Engineering) - Jaya Mukhi Institute of Technological Sciences (JNTUH)

2014 - 2018 · Afghanistan

Intermediate - Sri Narayana Junior College

- 2014 · Afghanistan

SSC - Thapar Vidya Vihar

- 2012 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceFeb 2026

Skills (16)

SIEM Tools: Azure Sentinel EDR/XDR: Microsoft Defender Email Security: Microsoft 365 Defender (EOP) IBM QRadar Forti SIEM Google Chronicle CrowdStrike Falcon Sentinel One OSNIT: Virus Total Abuse IPDB +6 more