Back to Developers
Manjegowda A k

Manjegowda A k

Security Analyst

Nagasandra Bangalore
70
Profile Score

About

Dedicated IT professional with over 4.2 Years of overall Experience SOC Analyst with 3.3 years of experience in database security analysis. Professional with the ability to manage sensitive materials. Skilled in using various security tools for logs and packet analysis. Focused on protecting an organization’s digital information and computer network. Ensures security by preventing unauthorized access. Seeking opportunities to contribute to the growth of an organization and enhance personal skills.

Skills & Expertise (31)

Incident Response Lifecycle Advanced
8.6/10
4
Years Exp
Splunk Advanced
8.5/10
4
Years Exp
Firewall Advanced
8.3/10
4
Years Exp
Microsoft Defender OSI Model TCP/UDP Proxy LOGS Logon types Sentinel Port CrowdStrike Email Gateway Windows LINUX Cortex XSOAR PaloAlto Protocol CIA Cyber Kill Chain MX Toolbox Site review VirusTotal Incident analysis Phishing attacks malware types Antivirus EDR WAF IDS/IPS AAA

Work Experience

Security Analyst

Tata Consultancy Services

Dec 2021 - Present

Respond to incidents and gather additional information to resolve or escalate to the appropriate teams. Analyze security event data from the network (IDS, IPS, Firewall, SIEM). Use SIEM tools like Securonix and Splunk Enterprise Security to document security breaches and responses daily. Strong understanding of the MITRE ATT&CK Framework. Perform SIEM operational tasks such as analysis, filters, and reports. Capable of leading incident response activities. Identify false positives and collaborate with the team for alert tuning. Detect suspicious logs and create reports/charts for easy understanding. Investigate the reputation of IP addresses, suspicious URLs, files, and hashes using VirusTotal and Symantec Site Review. Ensure the integrity and protection of networks, systems, and applications by monitoring vulnerability scanning devices. Monitor and resolve antivirus alerts and detection for endpoints with EDR. Analyze email-based threats using Email Gateway and MX Toolbox. Prepare and submit incident reports to the team lead. Correlate data, analyze graphs, and inspect packets to provide detailed reports. Monitor Indicators of Compromise (IOC). Stay updated with the latest security news. Hands-on experience with Windows, Linux. Generate daily, weekly, and monthly reports and charts. Strong understanding of various alerts and security attacks (XSS, SQL injection, phishing, brute force, etc.). Good knowledge of various types of malware and attack techniques (virus, worm, ransomware, adware, etc.). Follow all processes and standard operating procedures for consistent work.

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 0/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 70/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation

Skills (31)

Incident Response Lifecycle Splunk Firewall Microsoft Defender OSI Model TCP/UDP Proxy LOGS Logon types Sentinel +21 more