Back to Developers
Sai Ram

Sai Ram

SOC Analyst L2

Vijayawada, India 4+ yrs exp 93 · Outstanding

About

Results-driven SOC Analyst with 3.5+ years of hands-on experience triaging 40–60 alerts per shift across enterprise environments at Tata Consultancy Services. Proven expertise in SIEM engineering (Splunk, Sentinel, QRadar), EDR/XDR response (CrowdStrike, SentinelOne), and building 15+ custom detection rules mapped to MITRE ATT&CK tactics. Achieved ~15-min MTTD and ~45-min MTTR with 95% SLA compliance and a ~30% false-positive reduction through proactive tuning. Recognized with Star of the Month and client appreciation awards. Actively targeting SOC Analyst L2, Threat Hunter, IR Analyst, and Detection Engineer roles.

Skills & Expertise (42)

Splunk Advanced
9.1/10
3.5
Years Exp
Microsoft Sentinel Advanced
8.8/10
3.5
Years Exp
IBM QRadar Advanced
8.7/10
3.5
Years Exp
SPL Advanced
8.5/10
3.5
Years Exp
KQL Advanced
8.3/10
3.5
Years Exp
MITRE ATT&CK IOC Enrichment Cyber Kill Chain NIST CSF ISO 27001 Diamond Model Phishing Ransomware malware DDoS brute force Privilege Escalation ServiceNow Jira detection engineering Threat Hunting Incident Response Log Analysis Snort CrowdStrike Falcon SentinelOne Microsoft Defender XDR MISP VirusTotal AbuseIPDB ANY.RUN WIRESHARK Zeek IAM Monitoring Nessus Packet Analysis Python PowerShell SOAR Bash Azure AD AWS CloudTrail

Work Experience

SOC Analyst (L1 → L2)

Tata Consultancy Services (TCS)

Mar 2022 - Present

Client-facing SOC role supporting enterprise security operations; promoted to hybrid L2 responsibilities managing end-to-end incident lifecycle within a 10–12 analyst team. Triaged 40–60 security alerts per shift across Splunk, QRadar, and Microsoft Sentinel, maintaining 95% SLA compliance and <15-minute Mean Time to Detect (MTTD). Investigated and responded to phishing, BEC, ransomware, malware, DDoS, brute-force, privilege escalation, insider threats, and suspicious PowerShell/process-spawn events. Operated hybrid escalation model — resolved routine incidents autonomously and escalated complex cases to L3, reducing L3 queue by ~25%. Achieved ~45-minute Mean Time to Respond (MTTR) by executing structured runbooks and cross-tool correlation across CrowdStrike Falcon, SentinelOne, and Microsoft Defender. Authored 15+ custom Splunk detection rules spanning MITRE ATT&CK tactics — Initial Access, Execution, Persistence, Privilege Escalation, Lateral Movement, Exfiltration, and C2. Reduced false-positive alert volume by ~30% through iterative SPL/KQL query tuning, whitelist refinement, and correlation-rule optimisation across Splunk and Sentinel. Built end-to-end Splunk SIEM Detection Engineering & SOC Dashboard project — including data onboarding, field extractions, alert thresholds, and executive-level visualisations. Developed and maintained detection playbooks covering alert descriptions, investigation workflows, triage checklists, and automated response actions via SOAR integration. Enriched IOCs using VirusTotal, AbuseIPDB, and MISP to classify and pivot on malicious IPs, domains, file hashes, and URLs during active investigations. Performed packet-level analysis with Wireshark and Zeek to identify anomalous network behaviour, C2 beaconing, and lateral movement patterns. Leveraged ANY.RUN sandbox for dynamic malware analysis, accelerating triage decisions and improving containment accuracy. Monitored Azure Active Directory alerts for account compromise, MFA bypass attempts, and suspicious OAuth token activity; correlated with Sentinel workspace logs. Analysed AWS CloudTrail logs for unauthorised API calls, IAM privilege escalations, and S3 data exfiltration indicators. Awarded Star of the Month for consistent performance, rapid alert handling speed, and sustained SLA compliance. Received Manager and Client appreciation for accurate threat analysis, documentation quality, and proactive communication during high-severity incidents.

Education

Master of Computer Applications (MCA) - Andhra Loyola College, Krishna University

- · Afghanistan

Certifications

Certified Network Security Practitioner (with Merit)

The SecOps Group · 2025

Certified Cyber Exploitation Professional

Red Team Leaders · 2025

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 13/15
💰 Rate 0/5
🏆 Certs 5/5
Verified 5/5
Total Score 93/100

Profile Overview

Member sinceMay 2026