About
Dedicated Security Analyst with 3+ years of experience in Cybersecurity, SOC operations, incident response, and security monitoring. Proficient in Splunk Enterprise for log monitoring, SIEM alert analysis, threat hunting, and security incident investigation. Skilled in network security, log analysis, cloud security, and malware analysis, with working familiarity with Microsoft Sentinel. Proven ability to enhance detection accuracy, streamline incident response, and strengthen overall security posture.
Skills & Expertise (21)
Work Experience
Security Analyst
TCS
Jan 2022 - Present
Monitored and triaged security alerts using SIEM and EDR tools, ensuring timely incident response. Responsible for initial incident investigation, evidence collection, diagnosis, recovery within SLA and closing incidents. Provided L1 support for critical security issues, performing rapid log analysis and alert investigation to minimize response times. Analyzed Windows, firewall, email, Proxy and DNS logs using Splunk to identify and mitigate intrusion attempts. Design, implement and fine-tuning of Security use-cases on Splunk. Escalated verified security events to L2 and incident response teams, ensuring adherence to documented SOPs. Contributed to maintaining and updating security runbooks and procedures. Operated within a 24x7 Security Operations Center (SOC) environment, providing continuous threat detection and response. Managed the full lifecycle of incident tickets within ServiceNow, ensuring accurate troubleshooting and resolution. Documented investigation findings and generated comprehensive incident reports for the Security Management Team. Mapped security alerts, IOCs, and attacker behavior to the MITRE ATT&CK framework to support incident analysis & response.
Consultant – IT Risk Management (Cyber Security)
TCS
Jan 2022 - Present
Managed and responded to alerts on the Wiz cloud security dashboard, proactively identifying and mitigating vulnerabilities across cloud resources to ensure robust security and compliance. Managed comprehensive risk and vulnerability assessments to safeguard client assets. Working knowledge of cybersecurity audits, BCP/DR, and GRC principles, with the ability to align security operations findings to compliance and risk requirements. Scoped security incidents and evaluated their potential impact on client networks, providing evidence-backed recommendations for resolution. Conducted phishing investigations including email header analysis, URL, domain reputation checks and IP analysis. Implemented identity and access management (IAM) solutions leveraging Okta technologies.
Education
BE (Aeronautical Engineering) - ADCET, Ashta
2016 - 2020 · India
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Relocation
Open to Relocation