Back to Developers
Monika Patil

Monika Patil

SOC Analyst

Bangalore $50/hr
90
Profile Score

About

I have 3.2 years of experience as a SOC Analyst with strong skills in SIEM monitoring, incident investigation, and threat detection. I’ve handled incidents end-to-end, including phishing, malware, and suspicious activities, ensuring quick response and resolution. What makes me unique is my analytical approach, focus on root cause analysis, and interest in automation to improve efficiency. I can contribute immediately by strengthening threat detection and response in your SOC.

Skills & Expertise (56)

Cortex XSOAR Advanced
8.4/10
3
Years Exp
Azure Sentinel Advanced
8.3/10
3
Years Exp
Log Analysis Advanced
8.0/10
3
Years Exp
Investigation Advanced
8.0/10
3
Years Exp
Threat Detection Advanced
8.0/10
3
Years Exp
Security Log Monitoring Advanced
8.0/10
3
Years Exp
Threat Hunting Advanced
8.0/10
3
Years Exp
Incident Response Advanced
8.0/10
3
Years Exp
Microsoft Defender Advanced
7.8/10
3
Years Exp
Alert Triage Advanced
7.8/10
3
Years Exp
Splunk Intermediate
7.5/10
3
Years Exp
Microsoft Defender for Office 365 Advanced
7.5/10
3
Years Exp
Microsoft Purview DLP Advanced
7.5/10
3
Years Exp
Azure AD Sign-in Logs Advanced
7.5/10
3
Years Exp
Microsoft Entra ID Advanced
7.5/10
3
Years Exp
MITRE ATT&CK Advanced
7.5/10
3
Years Exp
Security Reporting Intermediate
7.0/10
2
Years Exp
SentinelOne Intermediate
7.0/10
2
Years Exp
Zscaler Intermediate
7.0/10
2
Years Exp
Filtering Intermediate
6.5/10
2
Years Exp
Pivot Tables Intermediate
6.5/10
2
Years Exp
Excel Reporting Intermediate
6.5/10
2
Years Exp
Documentation Intermediate
6.5/10
2
Years Exp
IBM QRadar Intermediate
6.5/10
2
Years Exp
ProofPoint Intermediate
6.5/10
2
Years Exp
Python Intermediate
5.5/10
1
Years Exp
Bash Intermediate
5.0/10
1
Years Exp
Cloudflare WAF Splunk SOAR Imperva Cyber Kill Chain Logic Apps KQL Palo Alto Networks NDR Darktrace HIPAA Cortex Xsiam Malware Analysis VirusTotal Qualys Guard Vulnerability Management Configuration Management AWS Azure Qualys FIM Tripwire Enterprise Certified Ethical Hacker V13 NIST CSF CISCO Talos MXToolbox STIX/TAXII MISP ISO 27001 SOC 2 GDPR Nessus

Work Experience

SOC Analyst

Cimpress India

Jan 2023 - Present

Proficient in managing and optimizing SIEM and SOAR platforms including Splunk, Cortex XSOAR, Azure Sentinel, and IBM QRadar for advanced threat detection, investigation, and analysis. Analyzed logs of various network devices (IDS/IPS, Firewall) and operating systems (Windows) using a SIEM tool, identifying potential security threats and vulnerabilities. Performed endpoint detection and response (EDR) using Microsoft Defender, SentinelOne helping identify and contain threats across organizational endpoints. Manage and monitor Proofpoint email security to detect, block, and respond to phishing, malware, and targeted attacks while ensuring policy enforcement and user protection. Correlate email headers, links, and payloads using tools like VirusTotal, Cisco Talos, and MXToolbox. Executed log analysis and root cause investigations across Windows and Linux systems to identify anomalies and suspicious behavior. Executed threat hunting exercises using the MITRE ATT&CK framework and IOC feeds. Continuously monitored and analyzed security alerts from SIEM, EDR, NDR, FIM, and NGAV platforms to identify, investigate, and respond to cyber threats in real time using Qualys FIM and Tripwire Enterprise. Performed incident triage, containment, eradication, and recovery activities in alignment with NIST Incident Response framework. Performed endpoint investigations using EDR tools to analyze malware, persistence mechanisms, lateral movement, and privilege escalation. Conducted post-incident reporting using XSOAR dashboards to track SOC efficiency and improve KPIs. Conducted advanced threat analysis and correlation across multiple telemetry sources to detect anomalous behavior and sophisticated attack patterns. Conducted post-incident reviews using kill chain mapping to improve threat hunting and reduce dwell time. Leveraged MITRE ATT&CK techniques (TTPs) to design and fine-tune SIEM/EDR detection rules (SPL, KQL). Enhanced SOC maturity by integrating threat intelligence feeds (STIX/TAXII, MISP) into XSOAR for proactive hunting. Tuned and optimized SIEM detection rules and EDR policies to reduce false positives and improve alert fidelity. Built and enhanced SOAR automation workflows for alert enrichment, automated containment, ticketing, and stakeholder notifications.

Support Executive

Focus Edumatics Pvt Ltd

Dec 2021 - Aug 2022

Technical Support Executive

Essl Pvt Ltd

Apr 2017 - Apr 2018

Education

M.Tech - Visvesvaraya Technological University (VTU)

2014 - 2016 · India

Certifications

CEH v13

EC-Council · 2026

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 5/5
🏆 Certs 5/5
Verified 5/5
Total Score 90/100

Profile Overview

Member sinceMar 2026

Skills (56)

Cortex XSOAR Azure Sentinel Log Analysis Investigation Threat Detection Security Log Monitoring Threat Hunting Incident Response Microsoft Defender Alert Triage +46 more