About
Having 6 years of professional experience, including 3.8 years of relevant hands-on experience as a SOC Analyst in security monitoring, incident response, and threat detection. Proficient in analyzing security alerts, identifying potential threats, and escalating incidents to protect enterprise networks. Skilled in SIEM tools, log analysis, and cybersecurity operations, with a strong focus on maintaining organizational security posture. Seeking to leverage expertise and contribute effectively to a dynamic Security Operations Center (SOC) team.
Skills & Expertise (20)
Work Experience
Network Engineer
KFIN TECHNOLOGIES PVT LTD
Nov 2019 - Feb 2023
Assisted in installation, configuration, and maintenance of routers, switches, firewalls, and access points across enterprise networks. Supported LAN/WAN operations, ensuring optimal performance, minimal downtime, and stable connectivity. Participated in troubleshooting network issues, resolving connectivity, latency, and routing problems efficiently. Maintained and updated network documentation, topology diagrams, and configuration records for compliance and audits. Collaborated with senior engineers and IT support teams to analyze network logs and identify performance bottlenecks. Ensured adherence to standard operating procedures (SOPs) and ITIL best practices during network changes or incidents. Provided technical support and end-user assistance for network connectivity and hardware-related issues.
SOC Analyst L1
KFIN TECHNOLOGIES PVT LTD
Mar 2023 - Oct 2025
Monitored and analyzed security events in a 24/7 SOC environment to detect and prevent intrusion attempts. Utilized SIEM platforms such as Splunk and IBM QRadar for real-time monitoring, correlation, and alert analysis. Escalated validated threats and incidents to Level 2 Analysts for advanced investigation and mitigation. Assisted in incident response activities, ensuring rapid containment and remediation of security threats. Collaborated with Threat Intelligence Teams to identify emerging threats and enhance proactive detection capabilities. Maintained detailed incident logs, reports, and documentation following SOC standard operating procedures (SOPs). Monitored email security alerts (phishing, spam, malicious attachments) and executed timely responses. Performed basic malware analysis and conducted URL/domain reputation checks using threat intelligence tools. Analyzed virus alerts triggered by endpoint protection systems and coordinated remediation steps with the Client Services Team. Generated daily, weekly, and monthly security reports summarizing key findings and incident trends. Collaborated with internal IT and network teams to troubleshoot and resolve security alerts efficiently. Tested suspicious URLs and attachments in isolated environments (sandboxing) to prevent malware propagation. Analyzed logs from multiple sources — web servers, application servers, databases, IDS/IPS systems — to identify anomalies or breaches. Developed and updated incident response playbooks to streamline SOC processes and improve operational efficiency.
Education
B. Tech - KAKATIYA UNIVERSITY
- 2016 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation