About
SOC Analyst with hands-on experience in Security Operations, SIEM monitoring, vulnerability assessment, and incident triage. Experienced in analysing security alerts, identifying Indicators of Compromise (IOCs), performing log analysis using Splunk, and conducting network scanning using Nmap and Nessus. Strong understanding of SOC workflows, MITRE ATT&CK framework, Cyber Kill Chain, CVSS scoring, and vulnerability remediation lifecycle. Skilled in TCP/IP analysis, firewall log review, and threat detection within 24x7 operational environments.
Skills & Expertise (19)
Work Experience
Bench Sales Recruiter
Sucanatek (I-Giants)
Sep 2022 - Nov 2023
Support infrastructure operations and /or manage delivery for IT production system and services. Flexibility to relocate for project deployment to any part of India and work in 24X7 shifts basic business. Engaged with clients to understand staffing needs and provided tailored solutions. Sourced, screened and evaluated candidates to ensure alignment with client requirements. Negotiated contract terms with clients and candidates, ensuring compliance and satisfaction. Managed a consistent pipeline of qualified candidates to meet client demands. Facilitated interview coordination between clients and candidates, ensuring a smooth process. Monitored recruitment metrics and performance to identify areas for improvement. Coordinated interviews between clients and candidates, ensuring efficient scheduling. Utilized various sourcing methods to attract and qualify candidates for client opportunities. Conducted candidate screenings and evaluations to ensure suitability for client positions. Managed contract negotiations and terms with clients and candidates, ensuring mutual satisfaction. Maintained a pool of qualified candidates to meet current and future client demands.
Bench Sales Recruiter
Infozeal Solutions Inc
Dec 2023 - May 2024
Support infrastructure operations and /or manage delivery for IT production system and services. Flexibility to relocate for project deployment to any part of India and work in 24X7 shifts basic business. Engaged with clients to understand staffing needs and provided tailored solutions. Sourced, screened and evaluated candidates to ensure alignment with client requirements. Negotiated contract terms with clients and candidates, ensuring compliance and satisfaction. Managed a consistent pipeline of qualified candidates to meet client demands. Facilitated interview coordination between clients and candidates, ensuring a smooth process. Monitored recruitment metrics and performance to identify areas for improvement. Coordinated interviews between clients and candidates, ensuring efficient scheduling. Utilized various sourcing methods to attract and qualify candidates for client opportunities. Conducted candidate screenings and evaluations to ensure suitability for client positions. Managed contract negotiations and terms with clients and candidates, ensuring mutual satisfaction. Maintained a pool of qualified candidates to meet current and future client demands.
Associate Software Engineer
CYE TECHNOLOGY PVT LTD
Apr 2025 - Present
Monitor and analyse 20–30 security alerts/tickets daily related to IP reputation, exposed services, and suspicious network activity. Perform SIEM log analysis using Splunk to detect anomalies, brute force attempts, unauthorized access, and abnormal traffic behaviour. Conduct alert triage and escalate high-severity incidents as per SOC standard operating procedures (SOP). Identify Indicators of Compromise (IOCs) including malicious IPs, unusual port activity, and abnormal login patterns. Perform network scanning using Nmap to identify open, filtered, and unauthorized ports. Conduct vulnerability assessments using Nessus and validate findings through manual verification. Prioritize vulnerabilities using CVSS scoring and asset criticality. Track remediation lifecycle and follow up with IT teams to ensure closure of high-risk vulnerabilities. Maintain asset inventory and document risk exposure reports. Support incident response lifecycle: Identification, Containment, Eradication, Recovery, and Lessons Learned. Ensure scanning and monitoring activities comply with internal security policies and operational stability requirements.
Education
B. Tech: MECH - ADITYA ENGINEERING COLLEGE
- 2022 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Need Sponsorship
Relocation
Open to Relocation