Back to Developers
Mallikarjuna Patnam

Mallikarjuna Patnam

Cybersecurity professional

80
Profile Score

About

Cybersecurity professional with 3.5+ years of IT experience. Strong background in Security Operations, Incident Response, and Threat Detection, skilled in leveraging a broad range of SIEM and EDR to safeguard systems and efficiently manage security incidents. Proficient in conducting dynamic malware analysis, vulnerability assessments, and evidence collection to strengthen organizational security posture. Adept at triaging phishing threats and ensuring the integrity of sensors and endpoints.

Skills & Expertise (24)

Endpoint Detection & Response (EDR) Advanced
8.8/10
4
Years Exp
CrowdStrike Falcon Advanced
8.6/10
4
Years Exp
Security Information and Event Management (SIEM) Advanced
8.6/10
4
Years Exp
Azure Sentinel Advanced
8.4/10
4
Years Exp
Microsoft Defender for Endpoint Advanced
8.4/10
4
Years Exp
Incident Response Advanced
8.4/10
4
Years Exp
MITRE ATT&CK Advanced
8.4/10
4
Years Exp
Threat Analysis & Intelligence Advanced
8.4/10
4
Years Exp
Cybersecurity Frameworks Advanced
8.2/10
4
Years Exp
NIST guidelines Advanced
8.2/10
4
Years Exp
Phishing Email Analysis Advanced
8.2/10
4
Years Exp
Cyber Kill Chain Advanced
8.0/10
4
Years Exp
Web Attack Detection Advanced
8.0/10
4
Years Exp
Email & Web Threat Detection Advanced
8.0/10
4
Years Exp
LINUX Intermediate
7.8/10
3
Years Exp
WIRESHARK Intermediate
7.8/10
3
Years Exp
Splunk Intermediate
7.8/10
3
Years Exp
VirusTotal Intermediate
7.6/10
3
Years Exp
Network & System Administration Intermediate
7.6/10
3
Years Exp
Any.Run sandbox Intermediate
7.6/10
3
Years Exp
MISP Intermediate
7.4/10
3
Years Exp
Service Now Intermediate
7.4/10
3
Years Exp
ServiceNow Intermediate
7.4/10
3
Years Exp
Salesforce Intermediate
6.8/10
2
Years Exp

Work Experience

Security Analyst

Ultraviolet Cyber (UVCyber)

Jun 2025 - Jan 2026

Perform in-depth analysis using OpenSearch (Kibana plugin), Singularity Data Lake, Sentinel One, and Torq AI to identify potential threats. Escalate confirmed incidents to customers with detailed investigation summaries and mitigation recommendations. Administer Endpoint Detection and Response (EDR) operations using Trend Micro, monitoring and responding to endpoint security incidents. Support both finance and multi-tenant MDR projects, handling clients from logistics, IT, banking, and marine sectors. Contribute to annual Cybersecurity Awareness Campaigns during October Cybersecurity Awareness Month, promoting best practices across the organization. Participated in all phases of incident response, from detection to post-incident reporting and lessons learned. Proposed and implemented security procedure improvements to mitigate future risks.

Security Analyst

Tata Consultancy Services

Jul 2021 - Apr 2025

Monitor and investigate security events in Microsoft Sentinel, building and tuning KQL analytics, workbooks, and scheduled queries to improve detection fidelity and visibility. Triage and respond to alerts from Microsoft Defender and CrowdStrike Falcon across Windows and Linux environments, determine impact, collect artifacts, and coordinate containment actions (host isolation, process termination, hash/URL blocking). Manage phishing response by monitoring Defender for Office 365 queues and shared mailboxes, analyzing headers and URLs/domains using MxToolbox, and executing mailbox remediation actions (quarantine/purge, block sender/domain). Perform malware and URL analysis using Any.Run detonations and VirusTotal pivots; validate IOCs and feed outcomes into Sentinel detections and blocklists. Extend vulnerability coverage to servers via Defender for Cloud (agentless and agent-based), prioritize remediation, and validate fixes using Secure Score for Devices and MDVM dashboards. Enrich investigations with threat intelligence (WHOIS, passive DNS, and reputation sources) and publish indicators to Defender, CrowdStrike policies, firewalls, and blocklists. Apply MITRE ATT&CK and Cyber Kill Chain frameworks to structure investigations, guide response actions, and enhance SOC playbooks/runbooks based on lessons learned. Produce SOC metrics (alert volumes, detection efficacy, MTTA/MTTR) on a weekly and monthly basis, and brief stakeholders on significant incidents and recurring attack patterns. Collaborate with cross-functional teams to improve processes and align controls with NIST, ITIL, and Australian Essential Eight requirements. Drive continuous improvement of SOC playbooks for phishing, malware, and endpoint containment to reduce false positives and accelerate containment time.

Education

B.Tech - SSN Engineering College

- · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceJan 2025

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation

Skills (24)

Endpoint Detection & Response (EDR) CrowdStrike Falcon Security Information and Event Management (SIEM) Azure Sentinel Microsoft Defender for Endpoint Incident Response MITRE ATT&CK Threat Analysis & Intelligence Cybersecurity Frameworks NIST guidelines +14 more