About
Cybersecurity Analyst with 3.8 years of experience in SOC operations, handling daily monitoring, alert triage, and investigations using SIEM and EDR tools. Experienced in phishing analysis, malware detection, log analysis, and initial incident response. Works closely with IT teams and senior analysts to support remediation and ensure timely incident closure. Skilled in implementing effective security measures to help protect organizational assets, while continuously enhancing cybersecurity skills.
Skills & Expertise (25)
Work Experience
Cybersecurity Analyst
Carl Zeiss Pvt Ltd
Mar 2022 - Present
Performed continuous monitoring and investigation of security alerts using IBM QRadar SIEM, XDR, and email security platforms to maintain a strong security posture. Analyzed phishing emails and campaigns, validated threats, and coordinated remediation actions with IT teams and end users. Conducted initial triage, root cause analysis, and in-depth log review across endpoint, firewall, proxy, DNS, and authentication sources to determine impact and containment steps. Investigated and responded to endpoint-related security alerts generated by EDR tools such as Microsoft Defender. Handled end-user–reported security incidents and managed investigation, remediation, and closure in coordination with stakeholders, ensuring timely resolution. Performed initial containment actions under supervision, including isolating endpoints, blocking malicious domains and IPs, revoking user sessions, and disabling affected accounts. Monitored and analyzed Azure Active Directory logs to identify suspicious activities and potential security threats. Performed threat hunting using KQL to identify anomalous behavior, malicious indicators, and unfamiliar sign-in activity, and used KQL-based investigations to reduce alert investigation time. Continuously fine-tuned and optimized SIEM rules to reduce false positives and improve alert fidelity. Developed and maintained SOPs for SOC and phishing operations, and prepared incident reports and post-incident documentation with clear timelines and evidence. Mentoring junior analysts and responsible for shift-related operations, including shift handovers, reviewing transition details, and driving shift transition and scrum calls.
SOC Analyst Intern
SOC Experts
Dec 2021 - Mar 2022
Gained foundational knowledge of SOC operations and commonly used security tools and technologies such as antivirus solutions, firewalls, intrusion prevention systems (IPS), email gateways, proxies, VPNs, and Active Directory. Familiar with malware and attack prevention concepts, including common malware types and attack vectors. Learned security fundamentals such as system hardening, vulnerability assessment, and risk management.
Education
Bachelor of Engineering - Rao bhadhur y mahabaleswarapp Engineering college Bellary
- 2021 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Need Sponsorship
Relocation
Open to Relocation