About
Dedicated IT professional with over 4.2 Years of overall Experience SOC Analyst with 3.3 years of experience in database security analysis. Professional with the ability to manage sensitive materials. Skilled in using various security tools for logs and packet analysis. Focused on protecting an organization’s digital information and computer network. Ensures security by preventing unauthorized access. Seeking opportunities to contribute to the growth of an organization and enhance personal skills.
Skills & Expertise (31)
Work Experience
Security Analyst
Tata Consultancy Services
Dec 2021 - Present
Respond to incidents and gather additional information to resolve or escalate to the appropriate teams. Analyze security event data from the network (IDS, IPS, Firewall, SIEM). Use SIEM tools like Securonix and Splunk Enterprise Security to document security breaches and responses daily. Strong understanding of the MITRE ATT&CK Framework. Perform SIEM operational tasks such as analysis, filters, and reports. Capable of leading incident response activities. Identify false positives and collaborate with the team for alert tuning. Detect suspicious logs and create reports/charts for easy understanding. Investigate the reputation of IP addresses, suspicious URLs, files, and hashes using VirusTotal and Symantec Site Review. Ensure the integrity and protection of networks, systems, and applications by monitoring vulnerability scanning devices. Monitor and resolve antivirus alerts and detection for endpoints with EDR. Analyze email-based threats using Email Gateway and MX Toolbox. Prepare and submit incident reports to the team lead. Correlate data, analyze graphs, and inspect packets to provide detailed reports. Monitor Indicators of Compromise (IOC). Stay updated with the latest security news. Hands-on experience with Windows, Linux. Generate daily, weekly, and monthly reports and charts. Strong understanding of various alerts and security attacks (XSS, SQL injection, phishing, brute force, etc.). Good knowledge of various types of malware and attack techniques (virus, worm, ransomware, adware, etc.). Follow all processes and standard operating procedures for consistent work.
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation