About
SOC Analyst with 2.5+ years of experience in SIEM monitoring, incident response, and endpoint security across enterprise environments. Skilled in alert triage, IOC analysis, phishing investigation, and threat detection using IBM QRadar, Microsoft Sentinel, and Microsoft Defender. Strong knowledge of incident response lifecycle, SLA-based escalation, MITRE ATT&CK; mapping, and SOC operational reporting.
Skills & Expertise (20)
Work Experience
Analyst
HCL Technologies
Sep 2021 - Jan 2024
Provided L1 SOC support for Microsoft Defender ATP and Symantec Endpoint Protection alerts. Investigated endpoint security incidents, escalated cases via ServiceNow within SLA timelines, and prepared incident reports and post-incident RCA documentation. Supported enterprise antivirus migration and compliance reporting activities.
Cybersecurity Intern
JD Infotech
May 2025 - Jun 2025
Analyzed IBM QRadar alerts and supported phishing incident investigation. Conducted reconnaissance, brute-force testing, and vulnerability scanning using Nmap and Burp Suite during internal security assessments.
Cybersecurity Intern
Futurism Technologies
Jul 2025 - Dec 2025
Monitored real-time SIEM alerts and performed Level-1 alert triage within SOC workflows. Assisted in phishing email investigations and IOC-based threat detection activities. Documented incident investigation notes, RCA findings, and shift handover reports.
Education
Bachelor of Engineering
2015 - 2019 · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Relocation
Open to Relocation
Skills (20)
Click a skill to find developers with the same skill