Back to Developers
Mounika Reddy

Mounika Reddy

SOC Analyst

Hyderabad
80
Profile Score

About

I am a results-driven SOC Analyst with 3+ years of experience in securing cloud, network, and enterprise environments. Proven expertise in SIEM platforms (Splunk, Cortex XSIAM) and endpoint security (Microsoft Defender, Sentinel-One, Kaspersky). Specialized in threat detection, incident response, ransomware defense, and threat hunting with a strong focus on building scalable, resilient security architectures. Seeking to contribute to a forward-thinking security team leveraging AI-driven analytics and real-time threat intelligence.

Skills & Expertise (23)

Splunk Enterprise Security Expert
8.9/10
3
Years Exp
SIEM tools Advanced
8.4/10
4
Years Exp
Microsoft Defender Advanced
8.2/10
3
Years Exp
Endpoint Detection & Response Advanced
8.0/10
3
Years Exp
Cortex Xsiam Advanced
7.4/10
1.5
Years Exp
Threat Hunting OSINT Tools Cyber Kill Chain MITRE ATT&CK framework Threat Intelligence & Incident Response Service Now ticketing tools Zscaler Proxy VPN IDS/IPS Fortinet Palo Alto Networks Network & Firewall Security Abnormal AI Email Security Kaspersky Sentinel-One

Work Experience

B1 Senior Executive

WIPRO

Sep 2020 - Jan 2022

As an Audit Spoc conducted audit checks on team members, gave them appropriate feedback regarding the policies that are binding on them.

Process Developer

GENPACT

Jun 2016 - Sep 2020

Worked on Customer Queries to provide First time resolution and ensuring the best customer experience.

Senior SOC Analyst

W3 SOFTTECH India Pvt Ltd

Jul 2023 - Present

Performed real-time security alert monitoring and incident investigation using Splunk SIEM ensuring timely incident resolution in accordance with defined SLAs. Conducted comprehensive log analysis across multiple security platforms to detect anomalies and potential threats. Executed proactive threat hunting activities using Microsoft Defender for Endpoint and Sentinel One. Structured and Unstructured Threat Hunting based on the MITRE ATT&CK framework. Analyzed and validated Indicators of Compromise (IOCs) using open-source intelligence (OSINT) tools and recommended appropriate endpoint containment and blocking actions. Investigated phishing and malware incidents, identifying malicious payloads and mitigating email-based threats. Leveraged Abnormal AI to detect and prevent advanced and anomalous email threats. Produced daily, weekly, monthly, and quarterly SOC reports, highlighting incident trends, KPIs, and security posture metrics. Performed raw log analysis to identify parsing gaps and improve log quality and data accuracy within SIEM. Investigated Microsoft Purview DLP incidents across email, endpoints, and cloud workloads, performing root-cause analysis on sensitive data leakage (PII/PCI/PHI). Worked closely with cross-functional teams and stakeholders to investigate incidents and reduce organizational risk. Created, tracked, and maintained incident records using ServiceNow, ensuring accurate documentation and audit readiness. Participated in daily shift handovers, ensuring seamless operational continuity and knowledge transfer. Ensured SOC operations aligned with business objectives and cybersecurity requirements. Utilized Splunk SPL and Kusto Query Language (KQL) to perform advanced log searches, correlations, and investigations. Tuned detection rules by analyzing IOCs and reducing false positives, improving alert fidelity. Developed and maintained incident response playbooks for phishing, ransomware, insider threats, and cloud security incidents based on real-world cases. Actively participated in war-room calls during critical incidents, providing real-time analysis and supporting rapid containment efforts. Mentored junior SOC analysts, conducted hands-on knowledge sessions on threat detection, MITRE ATT&CK mappings, and the effective use of SIEM dashboards and playbooks in a real-world SOC environment.

SOC Analyst

GOC

Jan 2022 - May 2023

Led daily threat triage using Cortex XSIAM, validating alerts and ensuring SLA-based resolution. Performed deep-dive incident investigations, including root cause, impact, and remediation analysis. Acted as a key analyst during critical incidents, guiding mitigation and recovery efforts. Supported 24x7 SOC operations, monitoring and defending client environments against advanced threats. Delivered weekly and monthly threat reports outlining attack trends, metrics, and security recommendations. Collected Threat Intel data using Open source and Threat Intel Companies. Ensured blocking of IOC’s in various security tools using SOAR on day-to-day basis. Documented confirmed incidents (true positives) to support historical analysis and SOC knowledge base. Analysed attacker TTPs to understand threat behaviour and improve detection strategies. Investigated endpoint and network threats using Kaspersky EDR and Zscaler proxy logs. Supported SOC audits and compliance reviews by providing incident evidence and documentation. Mapped incidents using MITRE ATT&CK and Cyber Kill Chain frameworks. Tracked emerging threats and malware variants to maintain proactive defence readiness. Monitored EPS trends, identified silent log sources, and performed SIEM health checks. Ensured industry compliance through close collaboration with security and governance teams.

Education

Bachelor of Technology (B. Tech) – Computer Science Engineering - Jawaharlal Nehru Technological University

- 2016 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceFeb 2026

Skills (23)

Splunk Enterprise Security SIEM tools Microsoft Defender Endpoint Detection & Response Cortex Xsiam Threat Hunting OSINT Tools Cyber Kill Chain MITRE ATT&CK framework Threat Intelligence & Incident Response +13 more