Back to Developers
Mayur Desale

Mayur Desale

SOC Analyst

3+ yrs exp 87 · Excellent

About

SOC Analyst with 3+ years of experience in security monitoring, threat detection, incident response, and threat hunting across enterprise environments. Skilled in SIEM tools (Splunk, Microsoft Sentinel, IBM QRadar) and EDR solutions (CrowdStrike Falcon, Microsoft Defender) for efficient threat detection and containment. Experienced in multi-source log analysis (firewall, proxy, IDS/IPS, WAF, endpoints, AWS CloudTrail) with a strong focus on reducing false positives through SIEM tuning and use-case development. Proficient in phishing investigation, malware analysis, and MITRE ATT&CK-based threat hunting, with hands-on experience in incident response and RCA aligned to NIST and ISO 27001 frameworks.

Skills & Expertise (39)

Security monitoring Advanced
8.6/10
3
Years Exp
Incident analysis Advanced
8.4/10
3
Years Exp
Alert Triage Advanced
8.2/10
3
Years Exp
False-positive reduction Advanced
8.0/10
3
Years Exp
Splunk Advanced
8.0/10
3
Years Exp
Imperva WAF Incident Response Lifecycle Phishing Analysis Proofpoint Email Gateway WIRESHARK Anyrun Hybrid Analysis McAfee ATD ServiceNow OSticket Documentation SLA handling MITRE ATT&CK Cyber Kill Chain NIST Cybersecurity Framework ISO 27001 SOC 2 Containment IBM QRadar Microsoft Sentinel Log Analysis Correlation Use-case tuning CrowdStrike Falcon Microsoft Defender for Endpoint Endpoint Investigation Zscaler Proxy AWS CloudTrail logs analysis Cloud Security Monitoring IAM activity review Recorded Future IOC Validation Palo Alto Firewall VPN

Work Experience

SOC Analyst

SAFFRON NETWORKS PVT LTD

Dec 2022 - Present

Perform 24/7 security monitoring and alert triage using SIEM platforms (Splunk, Microsoft Sentinel, IBM QRadar). Investigate and analyze security events from multiple log sources including firewall, proxy, IDS/IPS, WAF, email gateway, and endpoints. Identify true positives and eliminate false positives through detailed log correlation and analysis. Conduct endpoint investigations and containment using CrowdStrike Falcon and Microsoft Defender for Endpoint. Perform root cause analysis (RCA) and prepare detailed incident reports. Monitor diverse security events and logs (Proxy, IPS/IDS, Firewall, Email, Endpoints, Web Application Firewall) for situational awareness. Investigate phishing emails by analyzing headers, URLs, and attachments; provide remediation recommendations to users. Utilize threat intelligence (Recorded Future) for IOC validation and enrichment. Perform malware analysis using sandboxing tools such as AnyRun and Hybrid Analysis. Monitor AWS CloudTrail logs to detect suspicious activities including privilege escalation and anomalous API calls. Fine-tune SIEM rules to minimize false positives and eliminate false negatives. Monitor health of SIEM tools and security infrastructure to ensure continuous visibility. Collaborate with internal teams and vendors to improve detection coverage and SOC efficiency. Maintained detailed incident investigation documentation and security reports to support internal reviews and compliance evidence collection. Deliver concise SOC reports to senior management, outlining the current security status, recent incidents, threat trends, and control effectiveness.

Education

Bachelor of Engineering (BE)

- · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 12/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 87/100

Profile Overview

Member sinceApr 2026