Back to Developers
K J

K J

SOC Analyst (L1)

India
70
Profile Score

About

Client-side SOC Analyst with 1.5 years of experience in a regulated enterprise environment, receiving and validating alerts generated by an external MSSP. Hands-on experience investigating 200+ daily alerts across authentication, endpoint, network, and proxy layers — using SentinelOne EDR, Zscaler, and Cisco VPN logs independently on the client side. Strong background in root cause analysis, false-positive reduction, privileged account monitoring, and clear stakeholder escalation. Independently created SOC investigation playbooks adopted by the team, referenced during NPCI and PCI DSS audits, and used to train new analysts.

Skills & Expertise (33)

SentinelOne Intermediate
7.5/10
1.5
Years Exp
EDR Intermediate
7.1/10
1.5
Years Exp
Malware Detection Intermediate
6.9/10
1.5
Years Exp
Zscaler Intermediate
6.8/10
1.5
Years Exp
LogRhythm Intermediate
6.5/10
1.5
Years Exp
SU logs TryHackMe SOC labs auth logs Syslog MSSP Workflow client-side triage validation Compliance NPCI audit support PCI DSS training certification audit support KQL basics AWS Cloud Practitioner SSH brute force analysis Linux logs Event IDs 4688 Event IDs 4624 Event IDs 4625 Windows Logs IOC Validation AbuseIPDB VirusTotal credential misuse alerts brute force alerts Cisco VPN proxy log analysis Endpoint isolation quarantine validation

Work Experience

SOC Analyst – Client-Side SOC (L1)

C-EDGE Technologies

Present - Present

Served as the client-side security analyst responsible for receiving, validating, and acting on alerts generated by an external MSSP. All SIEM (LogRhythm) operations were managed by the MSSP; client-side tools included SentinelOne, Zscaler, Cisco VPN, and Windows/Linux log analysis. Investigated and closed 200+ daily MSSP-generated alerts, prioritizing by asset criticality and business impact with documented root cause and evidence for every closure. Analyzed SentinelOne EDR alerts for malware detections — confirmed execution status, validated quarantine actions, and coordinated endpoint isolation and full scans where required. Investigated Windows authentication alerts (Event IDs 4625, 4624) to detect brute force attempts, account lockouts, and anomalous login patterns; escalated confirmed threats with timelines and evidence. Analyzed process execution alerts (Event ID 4688) to identify suspicious script or binary behavior and escalated accordingly. Investigated Linux/Unix SSH brute force alerts; identified false positives caused by internal automation scripts, coordinated corrective actions, and closed with documented findings. Monitored privileged account (admin/root) activity and validated access against maintenance windows and change records to reduce unnecessary escalations. Investigated VPN brute force alerts; identified shared credential misuse and worked with IT teams to enforce access control improvements. Reviewed Zscaler proxy alerts for suspicious web traffic and validated against business context and threat intelligence (VirusTotal, AbuseIPDB). Extracted and validated IOCs (IP addresses, domains, file hashes) and included findings in escalation notes to the MSSP. Created and operationalized SOC alert investigation playbooks — adopted by the team, referenced during NPCI audits, and used to onboard and train new analysts on standardized triage and escalation workflows. Supported NPCI and PCI DSS audits by preparing security inventory, audit evidence, and compliance documentation. Participated in alert tuning discussions with the MSSP to reduce false positive noise and improve detection quality.

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 0/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 70/100

Profile Overview

Member sinceMar 2026

Availability Details

Relocation

Open to Relocation

Skills (33)

SentinelOne EDR Malware Detection Zscaler LogRhythm SU logs TryHackMe SOC labs auth logs Syslog MSSP Workflow +23 more