About
I have 3.2 years of experience as a SOC Analyst with strong skills in SIEM monitoring, incident investigation, and threat detection. I’ve handled incidents end-to-end, including phishing, malware, and suspicious activities, ensuring quick response and resolution. What makes me unique is my analytical approach, focus on root cause analysis, and interest in automation to improve efficiency. I can contribute immediately by strengthening threat detection and response in your SOC.
Skills & Expertise (56)
Work Experience
SOC Analyst
Cimpress India
Jan 2023 - Present
Proficient in managing and optimizing SIEM and SOAR platforms including Splunk, Cortex XSOAR, Azure Sentinel, and IBM QRadar for advanced threat detection, investigation, and analysis. Analyzed logs of various network devices (IDS/IPS, Firewall) and operating systems (Windows) using a SIEM tool, identifying potential security threats and vulnerabilities. Performed endpoint detection and response (EDR) using Microsoft Defender, SentinelOne helping identify and contain threats across organizational endpoints. Manage and monitor Proofpoint email security to detect, block, and respond to phishing, malware, and targeted attacks while ensuring policy enforcement and user protection. Correlate email headers, links, and payloads using tools like VirusTotal, Cisco Talos, and MXToolbox. Executed log analysis and root cause investigations across Windows and Linux systems to identify anomalies and suspicious behavior. Executed threat hunting exercises using the MITRE ATT&CK framework and IOC feeds. Continuously monitored and analyzed security alerts from SIEM, EDR, NDR, FIM, and NGAV platforms to identify, investigate, and respond to cyber threats in real time using Qualys FIM and Tripwire Enterprise. Performed incident triage, containment, eradication, and recovery activities in alignment with NIST Incident Response framework. Performed endpoint investigations using EDR tools to analyze malware, persistence mechanisms, lateral movement, and privilege escalation. Conducted post-incident reporting using XSOAR dashboards to track SOC efficiency and improve KPIs. Conducted advanced threat analysis and correlation across multiple telemetry sources to detect anomalous behavior and sophisticated attack patterns. Conducted post-incident reviews using kill chain mapping to improve threat hunting and reduce dwell time. Leveraged MITRE ATT&CK techniques (TTPs) to design and fine-tune SIEM/EDR detection rules (SPL, KQL). Enhanced SOC maturity by integrating threat intelligence feeds (STIX/TAXII, MISP) into XSOAR for proactive hunting. Tuned and optimized SIEM detection rules and EDR policies to reduce false positives and improve alert fidelity. Built and enhanced SOAR automation workflows for alert enrichment, automated containment, ticketing, and stakeholder notifications.
Support Executive
Focus Edumatics Pvt Ltd
Dec 2021 - Aug 2022
Technical Support Executive
Essl Pvt Ltd
Apr 2017 - Apr 2018
Education
M.Tech - Visvesvaraya Technological University (VTU)
2014 - 2016 · India
Certifications
CEH v13
EC-Council · 2026