About
SOC Analyst with 4+ years of hands-on experience (including internship) in security monitoring, alert triage, incident response, and threat investigations using SIEM and SOAR platforms such as Splunk Enterprise, Cortex XSIAM, Azure Sentinel, and IBM QRadar. Skilled in malware analysis, KQL, SOAR automation, threat hunting, and vulnerability management across cloud and on-premises environments. Proven ability to analyze security events, reduce false positives, and improve SOC processes. Strong understanding of MITRE ATT&CK, EDR tools, and incident response playbooks. Committed to continuous learning and delivering proactive cybersecurity solutions.
Skills & Expertise (1)
Work Experience
SOC Analyst
KLR DIGITECH PRIVATE LTD
10-2024 - Present
Continuously monitored security events and alerts using SIEM tools (Splunk, QRadar, Cortex XSIAM, Azure Sentinel) to detect potential security incidents. Performed Tier 1 and Tier 2 incident analysis, including phishing attacks, malware infections, brute-force attempts, and suspicious network activity. Conducted detailed log analysis across firewalls, IDS/IPS, servers, endpoints, and cloud environments to identify root cause and scope of incidents.
SOC Analyst
AVIET SOLUTIONS PRIVATE LTD
04-2022 - 04-2024
Monitored and triaged alerts in Cortex XSIAM, correlating endpoint, network, and identity telemetry to identify advanced threats. Investigated suspicious activity using XSIAM’s AI-driven analytics, performing root cause analysis (RCA) and documenting findings for incident reports.
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Current Company
Other
Visa Status
No Visa
Relocation
Open to Relocation