About
Cybersecurity Analyst with 3+ years of experience in Security Operations Center (SOC) environments. Expertise in SIEM tools (Microsoft Sentinel, QRadar, Splunk), Microsoft Defender, phishing analysis, and incident response. Proficient in threat detection, email protection (Proofpoint), and endpoint security. Known for detailed analysis, RCA documentation, SOP creation, and driving resolution within SLAs. Strong knowledge of Kusto Query Language (KQL) and 24/7 security operations.
Skills & Expertise (6)
Work Experience
SOC Analyst - Security Operations
Mindtree Ltd., Bangalore
Jun-2019 - Dec-2022
- Azure Sentinel log collection from Azure AD, Office 365, Syslog - Created weekly dashboards and reports on threat activity - Proficient in KQL for log queries and automation - Supported agile delivery and participated in sprint planning
Security Analyst - SOC L1
RSM Delivery Center
Dec-2022 - May-2023
- Monitored events using SIEM Monster and email gateway tools - Investigated alerts using log analysis tools - Worked with DQL for data correlation and user activity monitoring - Maintained incident reports, dashboards, and SOP documentation
Information Security Analyst - SOC L1
CF GSS Private Limited
Aug-2023 - Present
- Act as L1-L2 bridge for escalated alerts from external SOC team - Investigate and classify alerts as TP/FP using tools like VirusTotal, AnyRun - Containment via Microsoft Defender, session revocation, password resets - Handle phishing by quarantining emails, blocking URLs/IPs - Collaborate with IT for system isolation/reimaging - Maintain investigation reports, RCA documents, IOC tracking
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Depends on Offer