Back to Developers
Nagaraj I

Nagaraj I

SOC Operations | Incident Response | Threat Hunting

Bangalore, India 6+ yrs exp 90 · Outstanding

About

Dynamic and results-driven professional targeting roles in SOC Operations, SIEM Engineering, Incident Response and Threat Detection to strengthen enterprise security posture and proactively mitigate cyber risks.

Skills & Expertise (41)

Security Operations Center Expert
9.0/10
5
Years Exp
Incident Response Advanced
8.8/10
5
Years Exp
Threat Hunting Advanced
8.6/10
5
Years Exp
SIEM administration Advanced
8.5/10
5
Years Exp
Endpoint Detection & Response Advanced
8.4/10
5
Years Exp
Amazon Web Services Attention to Detail Microsoft Azure Qualys Nmap Cisco Firewall IPS Forcepoint VirusTotal URLvoid IPvoid ServiceNow Jira ManageEngine Analytical Thinking Problem-solving Effective Communication Adaptability Microsoft Sentinel Malware Analysis Security monitoring Cloud Security Monitoring Vulnerability Assessment Phishing Analysis Security Use Case Development Network Security Intrusion Detection Systems Microsoft Defender 365 Google SecOps Splunk ArcSight SentinelOne Carbon Black CrowdStrike Microsoft Defender for Endpoint Azure Security Center

Work Experience

Consultant – Senior SOC Analyst

KPMG

Apr 2024 - Present

Monitored network traffic, security alerts, and event logs across Firewalls, Windows, Linux, Databases, EDR solutions, and cloud environments using Microsoft Sentinel and Google SecOps to identify and respond to potential cyber threats and incidents. Analyzed event data and validated SIEM use case rules during UAT phases, identifying false positives, rule gaps, and detection inefficiencies prior to production deployment. Conducted malware analysis and endpoint investigations using Microsoft Defender for Endpoint and SentinelOne, delivering detailed Root Cause Analysis (RCA) reports for security incidents. Reviewed and escalated incidents from L1 analysts, performed deep-dive investigations, correlated events across multiple log sources, and recommended mitigation actions for critical and high-severity incidents. Enhanced alert accuracy by fine-tuning SIEM and EDR rules, thresholds, correlation logic, and detection use cases to reduce false positives and improve threat visibility. Generated and delivered daily, weekly, and monthly SOC operational and incident management reports for stakeholders and leadership teams.

Solution Delivery Advisor – Cyber & Strategic Risk (SOC Analyst)

Deloitte

May 2021 - Mar 2024

Delivered end-to-end Security Operations Center (SOC) services, ensuring continuous monitoring and incident management across enterprise environments. Conducted incident response investigations and malware analysis using Splunk and EDR tools including Carbon Black and Microsoft Defender ATP. Performed proactive threat hunting to identify vulnerabilities, suspicious activities, and security gaps across organizational infrastructure. Coordinated with internal stakeholders and cross-functional teams during major security incidents, ensuring timely containment, remediation, and resolution. Leveraged Microsoft Defender 365 to execute advanced hunting queries and strengthen threat investigation capabilities. Investigated and validated phishing attacks, initiated incident response procedures, and mitigated potential email security threats. Monitored and responded to cloud security alerts generated from Amazon Web Services and Microsoft Azure environments. Performed Active Directory password resets for users impacted by phishing campaigns to minimize account compromise risks. Managed USB exception requests and provided secure USB access permissions in compliance with organizational security policies.

Cyber Security Analyst (SIEM)

Jconnect Infotech Pvt. Ltd. (Client: Wipro)

May 2019 - May 2021

Operated as a Security Operations Center (SOC) Analyst utilizing ArcSight for continuous security monitoring and incident analysis. Performed proactive threat hunting and investigated security alerts to accurately identify true positives and eliminate false positives. Collaborated closely with L1 analysts and escalated complex incidents to L2 teams for advanced investigation and remediation activities. Conducted preliminary threat analysis using security intelligence tools such as VirusTotal, URLVoid, and IPVoid. Managed incident tracking and resolution activities using ManageEngine while maintaining knowledge repositories and escalation matrices. Executed Windows device integrations and provided 24/7 operational support for incident monitoring and resolution activities. Prepared and maintained operational reports, conducted regular SIEM health checks, and monitored logs to ensure continuous security visibility and platform stability.

Education

Bachelor of Engineering - Vishveshwaraiyya Technological University

- · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 15/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 90/100

Profile Overview

Member sinceMay 2026

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation