Back to Developers
LAKKOJU RAMESH

LAKKOJU RAMESH

Senior SOC Analyst

Visakhapatnam, India
80
Profile Score

About

Senior Security Operations professional with 6+ years of IT experience, including 4.5+ years in enterprise SOC environments supporting large-scale government and corporate infrastructures. Demonstrated expertise in SIEM monitoring, advanced incident investigation, threat hunting, EDR response, and SOC process optimization. Strong background in IBM QRadar, ArcSight, Splunk, and security operations leadership with a consistent record of improving detection accuracy, response efficiency, and SLA compliance.

Skills & Expertise (57)

IDS/IPS DHCP subnetting OSI Model LAN/WAN ITSM & Ticketing ServiceNow CA Service Desk Incident detection Analysis & Response Threat Hunting IOC Analysis Endpoint Detection & Response Network Security & Traffic Analysis Firewall DNS Proxy & Email Security Web Application Security OWASP Top 10 Cyber Attack Mitigation Log Analysis Correlation Rules Alert Tuning Incident Management SLA Compliance Security Reporting Dashboard Creation SOP Development Process Improvement Proxy IBM QRadar ArcSight Splunk Endpoint Security CrowdStrike Falcon SentinelOne Microsoft Defender Threat Intelligence Rapid7 Insight Security Controls Firewalls IDS/IPS Email Security SIEM & Monitoring Cisco Umbrella Web Security Barracuda Web Application Firewall Threat & Attack Analysis malware Phishing Ransomware DDoS MITM SQL Injection XSS Networking TCP/IP

Work Experience

Associate SOC Analyst

National Informatics Center (NIC)

Jan 2025 - Present

Perform advanced security event monitoring, investigation, and response using IBM QRadar in a high-availability SOC environment. Conduct malware and phishing investigations, including IOC extraction, threat validation, and containment actions. Execute threat hunting activities leveraging SIEM, EDR, and endpoint telemetry. Administer QRadar including log aggregation, normalization, correlation tuning, DSM updates, and integrations. Monitor SIEM platform health (CPU, RAM, disk, backups) and perform corrective actions proactively. Generate weekly and ad-hoc SOC intelligence reports for stakeholders. Lead email security investigations, analyzing headers and coordinating remediation actions. Support EDR-based investigations with real-time response actions such as file isolation and antivirus scans. Develop and maintain SOC SOPs for integrations, incident handling, and escalation procedures. Manage user access, roles, and privileges for SOC personnel. Coordinate with security engineers and external teams for incident resolution and platform optimization.

Technical Support Engineer (L1/L2)

DXC Technology Pvt. Ltd.

Feb 2018 - Apr 2021

Provided L1/L2 technical support for enterprise hardware, software, and network environments. Monitored infrastructure performance via Grafana dashboards. Resolved Windows OS, endpoint, printer, and peripheral issues. Managed incidents using ServiceNow and other ITSM platforms. Created knowledge base documentation and assisted with root cause analysis. Coordinated with engineering teams for escalated technical issues. Investigated and resolved 1,000+ security alerts annually across SIEM and EDR platforms. Reduced false positives by 30% through alert tuning, improved correlation rules, and SOP enhancements. Maintained 99%+ SLA compliance for incident triage, escalation, and closure. Successfully handled 100+ phishing and malware incidents, preventing lateral movement and data exposure. Improved SOC operational efficiency by 25% through structured reporting and proactive threat hunting. Supported onboarding and normalization of 50+ log sources into IBM QRadar. Conducted continuous SIEM health monitoring resulting in zero critical SIEM outages.

SOC Analyst

IBM Kyndryl

Apr 2021 - Jan 2025

Delivered round-the-clock SOC services for enterprise clients using ArcSight SIEM. Investigated security incidents related to malware, ransomware, phishing, and DDoS attacks. Executed end-to-end incident response, ensuring accurate documentation and SLA adherence. Performed detailed IOC analysis and root cause investigations. Prepared structured incident triage and investigation reports with remediation recommendations. Designed and maintained SIEM dashboards, filters, and monitoring views. Supported incident escalation, stakeholder communication, and shift operations. Assisted clients with risk mitigation strategies and post-incident improvements.

Education

B.Tech – Computer Science Engineering - JNTU Kakinada

- 2013 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceFeb 2026

Skills (57)

IDS/IPS DHCP subnetting OSI Model LAN/WAN ITSM & Ticketing ServiceNow CA Service Desk Incident detection Analysis & Response +47 more