Back to Developers
Mahesh Mucherla

Mahesh Mucherla

Security Analyst

Bangalore
80
Profile Score

About

Security Analyst with 4.5+ years of success in investigating security-related breaches, installing data encryption, and implementing incident response/risk assessment strategies to avert unauthorized access. Proven ability to understand and follow incident response procedures in fast-paced environments. Proficient at training staff on alerting customers to possible malicious activity, resolving priority cases, and creating reports that enable experts to modify security policies.

Skills & Expertise (55)

SIEM Advanced
8.7/10
4.5
Years Exp
Splunk Advanced
8.5/10
4.5
Years Exp
Microsoft Azure Sentinel Advanced
8.4/10
3
Years Exp
Incident Response Advanced
8.2/10
4
Years Exp
Security advisory Anti-malware DDoS Mx Tool box URL scan IP Spoofing SQL-injection IDS IPS MITRE ATTACK Framework Kusto Query Language Firewalls DLP Abuse IPDB Anti-virus Spam Phishing TTP mails Email gateways Proof Point Mimecast malware Security monitoring Operation IBM QRadar ArcSight Cyber Kill Chain ticketing tools EDR Vulnerability Management Networking Operating System E-mail Security IBM QRadar Service Now Jira Microsoft 365 Defender Crowd strike Data loss prevention URL void Qualis Guard Nessus TCP/IP VPN OSI Windows Linux Servers Phisher Proof Point Virus Total IP Void

Work Experience

Associate Security Engineer

EsecForte Technologies

Nov 2023 - May 2024

Supported web and mobile application security testing aligned with OWASP standards. Conducted application vulnerability scans using AppScan and WebInspect. Monitored and tracked remediation progress and provided reports to management. Assisted in risk assessments and threat modeling activities. Worked with Splunk SIEM to monitor, correlate, and analyze application security events.

Soc Analyst

TCS

May 2024 - Present

Implement and manage centralized log collection, parsing, and correlation in Splunk Enterprise Security. Develop, fine-tune, and optimize correlation rules to improve incident detection and reduce false positives. Administer and monitor Microsoft Defender ATP and CrowdStrike Falcon agents across Windows and Linux systems. Perform host isolation, threat analysis, and containment using EDR tools. Prepare endpoint compliance reports and initiate remediation processes wherever required. Manage Office 365 Email Security (Safe Links, Safe Attachments, and DLP rules). Investigate phishing emails, escalate verified threats, and provide user awareness feedback. Collaborate with internal teams for threat remediation and incident closure.

Security Analyst

Wipro

Jun 2021 - Oct 2023

Monitored and investigated alerts generated from CrowdStrike Falcon, Symantec AV, and MCAS. Created custom detection rules in Azure Sentinel using KQL. Performed phishing and malware email analysis using Office 365 Defender and sandbox verdicts. Conducted forensic investigations to identify IoCs and attack vectors. Handled user access and sign-in anomalies in Azure AD (interactive/non-interactive logins). Applied MITRE ATT&CK framework and Diamond Model methodologies for threat analysis. Utilized ServiceNow and JIRA for incident management and documentation.

Education

Bachelor of Computer Science and Education - ISBM University

2019 - 2021 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceFeb 2026

Skills (55)

SIEM Splunk Microsoft Azure Sentinel Incident Response Security advisory Anti-malware DDoS Mx Tool box URL scan IP Spoofing +45 more