Back to Developers
MRaksha

MRaksha

Senior SOC (L2) Analyst

Bengaluru, India
80
Profile Score

About

SOC Analyst (L2) with 3+ years of experience in Security Operations, Threat Detection, and Incident Response across MSSP environments. Hands-on expertise in IBM QRadar, Microsoft Azure Sentinel (KQL), SIEM monitoring, Devo, and Swimlane. Skilled in threat hunting, log analysis, IOC mapping, and incident handling aligned with MITRE ATT&CK, NIST, and SANS frameworks. Proven ability to reduce false positives, improve detection use cases, and maintain SLA-driven response in 24/7 SOC environments. Currently upskilling in advanced SIEM and SOAR use case development, threat hunting, and cloud security (Azure).

Skills & Expertise (36)

Threat Detection & Incident Response Advanced
8.4/10
3
Years Exp
IBM QRadar Advanced
8.1/10
3
Years Exp
Microsoft Azure Sentinel Advanced
7.9/10
3
Years Exp
KQL Advanced
7.5/10
3
Years Exp
TCP/IP Log Analysis & Correlation Rule Tuning DNS HTTP/HTTPS Malware & Phishing Analysis Email Threat Investigation MXToolbox Header Analyzer Cyber Kill Chain MITRE ATT&CK framework Malware Analysis NIST Framework Playbook Design SLA-driven Response Threat Hunting & IOC Analysis Network Administration Devo Swimlane CP4S Console Microsoft Defender CONA ServiceNow Windows LINUX Network Traffic Analysis SQL OpenCTI IBM X-Force VirusTotal AbuseIPDB Anomali Sandbox URLScan

Work Experience

Level 1 SOC Analyst

Capgemini

Aug 2022 - Oct 2025

This project provides 24/7 monitoring services for 16 clients, including both internal and external customers, all integrated on a single SIEM platform. Reduced incident detection and response time (MTTD) by 25% by fine-tuning correlation rules and optimizing alert thresholds. Maintained SLA compliance above 90% across all assigned accounts and ensured accurate alert categorization. Monitored security events for 16 clients on a unified IBM QRadar platform. Performed initial triage of events, categorized incidents, and escalated validated threats to the L2 team. Conducted regular health checks on log sources and performed log gap analysis to ensure complete visibility. Generated daily and weekly security incident reports with detailed findings and remediation suggestions. Coordinated with internal stakeholders and clients to ensure clear communication and timely updates.

Level 2 / Shift Lead

Capgemini

Aug 2022 - Oct 2025

Worked as part of the SOC team supporting the IKEA environment, responsible for continuous security monitoring, alert triage, incident handling, and escalation of suspicious activities. Supported critical incident handling by coordinating with resolver teams and ensuring timely updates during high-priority security events. Acted as a point of contact during major incidents, facilitating communication between SOC and internal technical teams. Ensured operational efficiency during shifts by maintaining alert queues, SLA compliance, and effective incident escalations. Prioritized and managed P1/P2 critical incidents with immediate attention and timely escalation. Conducted bridge calls during high-severity incidents and coordinated with cross-functional teams for effective resolution. Shared relevant logs, IOCs, and investigation findings with resolver teams to support remediation and closure. Ensured accurate documentation and end-to-end tracking of alerts and incidents in line with client and SOC standards.

Level 2 SOC Analyst

Capgemini

Aug 2022 - Oct 2025

Client: Leading automotive manufacturing MNC (Europe). Awarded 'Performance Excellence 2024' for outstanding performance. Improved detection efficiency by tuning SIEM rules and reducing false positives. Designed and implemented incident response playbooks. Investigated and escalated true positives identified by L1 team, ensuring timely response and stakeholder communication. Reduced false positives by optimizing correlation rules, fine-tuning use cases, and integrating IOCs. Developed and implemented incident response playbooks aligned with MITRE ATT&CK, NIST, and SANS frameworks. Utilized advanced KQL in Azure Sentinel for threat detection, anomaly identification, and pattern analysis.

Education

B.E. in Electronics and Telecommunications - Channabasaveshwara Institute of Technology

- · Afghanistan

Higher Secondary Education - Vijaya PU College

- · Afghanistan

Secondary Education - Don Bosco High School

- · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Need Sponsorship

Relocation

Open to Relocation

Skills (36)

Threat Detection & Incident Response IBM QRadar Microsoft Azure Sentinel KQL TCP/IP Log Analysis & Correlation Rule Tuning DNS HTTP/HTTPS Malware & Phishing Analysis Email Threat Investigation +26 more