About
Cyber security Analyst with 3+ years of experience in 24/7 Security Operations Center (SOC) environments. Proficient in using SIEM tools such as AlienVault, Elastic search, Microsoft Sentinel and Seceon to monitor, detect, and respond to security events. Expertise in incident handling, threat detection and log analysis. Skilled in providing real-time security event response, ensuring system integrity, and mitigating security risks. Committed to continuous improvement and maintaining compliance with industry standards (NIST, OWASP Top 10, MITRE ATT&CK).
Skills & Expertise (24)
Work Experience
Trainee Security Analyst
Accel IT services
Sep 2022 - Apr 2023
Supported real-time SOC monitoring, triaged and escalated alerts based on severity and threat indicators. Handled low to moderate severity incidents independently and collaborated with senior analysts for complex cases. Conducted log analysis and event correlation across multiple data sources to identify suspicious activity. Used AlienVault OSSIM to detect anomalies and generate correlation rules to improve incident detection. Worked on client reports, documenting findings and remediation steps for recurring issues. Assisted in patch management verification by correlating missing patches with identified vulnerabilities. Participated in vulnerability scanning and verification using Nessus and Qualys, contributing to periodic assessments. Documented incident response procedures and maintained knowledge base articles for repetitive tasks. Participated in knowledge-sharing sessions and supported RCA documentation under supervision.
Cyber Security Analyst
Accel IT services
Apr 2023 - Present
Monitor and analyze security events in a 24/7 SOC environment using SIEM tools (AlienVault, Microsoft Sentinel, Seceon, Elastic Search), resolving incidents within adherence to SLA. Serve as Single Point of Contact (SPOC) for key clients, ensuring timely communication and incident escalation. Security Incident Response: Responsible for monitoring security alerts. Analysis of logs generated by appliances, investigation, and assessment on whether the incident is False positive or True positive. Use SIEM tools (AlienVault, Elastic Search, Microsoft Sentinel & Seceon.) to detect possible signs of security breaches and perform detailed investigation to confirm successful breach. Performed root cause analysis (RCA) and appropriately handle the incident as per defined Incident Management Framework. Following end to end Incident Investigation and Incident Response process, ensuring close the investigation within defined SLA. Escalation of security incidents to concerned teams and their management and follow- up for closure. Proactive Threat hunting and Threat detection of all attacks using MITRE ATT&CK framework, identifying advanced threats and improving detection accuracy. Creating tickets in SolarWinds and tracking the status of the incidents. Generate daily and monthly reports for incident management and compliance, ensuring alignment with NIST and OWASP Top 10 standards. Knowledge sharing sessions with the team members whenever complex incident issues are raised and lessons learned from other team members.
Education
B.Tech in Electrical and Electronics Engineering - P.E.S University
- 2020 · Afghanistan
12th - Guru Nanak Independent PU College
- 2014 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation