About
Cyber security Analyst with 3+ years of experience in Security Operations Centre environments. Expertise in monitoring, analysing, and responding to security incidents using SIEM tools (Splunk, Cortex Xsiam). Proficient in incident response, Threat intelligence, Email analysis, and Malware analysis, with a demonstrated ability to detect and mitigate advanced threats. Good background in vulnerability management, log correlation, and security framework implementation (MITRE ATT&CK), NIST. Adept at collaborating with cross-functional teams to enhance threat visibility, strengthen security posture, and meet compliance requirements.
Skills & Expertise (3)
Work Experience
Security Analyst
Tata Consultancy Services
05-2022 - 09-2025
Monitored and Analyzed and responded to real-time security alerts using Splunk & Cortex XSiam, IDS/IPS, firewalls, and Endpoint protection platforms (Microsoft Defender, Sentinel-One) in real-time ensuring accurate. Performed incident triage of security incidents to identify false positives v/s real threats and severity( like low, medium, high, critical) and timely escalation. Provided L1 SOC support, maintaining SLA and delivering effective incident resolution. Performed multi-platform log analysis to detect anomalies, suspicious behavior, and potential security threats. Conducted proactive threat hunting activities using Microsoft Defender and Sentinel One. Investigated Indicators of Compromise (IOCs) through OSINT sources and advised endpoint blocking. using threat intelligence platforms, including Virus Total, Shodan, and IBM X-Force Performed detailed phishing email analysis using Abnormal AI and mx-tool box to mitigate email-based threats. Monitored and analyzed DLP alerts to detect sensitive data leaks using Microsoft purview. Prepared daily, weekly, monthly, and quarterly SOC reports to highlight security trends and operational performance. Conducted raw log analysis to detect parsing issues and reported to engineering team. Utilized Microsoft Azure to identify and analyze risky user sign-ins for potential account compromise. Collaborated with SOC engineering teams to on board and decommission log sources in Splunk. Coordinated with cross-functional teams and stakeholders to resolve incidents Participated in daily shift handovers, ensuring smooth transitions and regular incident tracking across teams. Utilized SPL (Splunk Processing Language) and KQL (Kusto Query Language) for log extraction and analysis. Created SOP documents on phishing email analysis and malicious incidents.
Education
B. Tech
2017 - 2020 · India
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Current Company
Tata Consultancy Services
Visa Status
No Visa
Relocation
Open to Relocation