Back to Developers
Sreevidya Nara

Sreevidya Nara

SOC Analyst

Bengaluru, India 80 · Excellent

About

SOC Analyst with 4.8 years of experience in Security Operations, SIEM Engineering, Threat Detection, and Incident Response within 24x7 MSSP environments. Proven expertise in IBM QRadar, Splunk, Microsoft Sentinel, and advanced security tools including CrowdStrike, Defender for Endpoint, Proofpoint, and Cortex XSOAR. Strong hands-on experience in log source onboarding, correlation rule creation, threat hunting (MITRE ATT&CK), and incident lifecycle management. Adept at reducing false positives, improving detection use cases, and providing actionable security insights to enterprise clients.

Skills & Expertise (24)

Splunk Advanced
8.5/10
4.8
Years Exp
Microsoft Sentinel Advanced
8.5/10
4.8
Years Exp
QRadar Advanced
8.5/10
4.8
Years Exp
MITRE ATT&CK Advanced
8.3/10
4.8
Years Exp
Cortex XSOAR Intermediate
7.8/10
4.8
Years Exp
Acunetix Burp Suite Symantec DLP Forcepoint DLP OSI Model IP TCP Nessus Qualys Email Header Analysis Phishing Analysis ProofPoint Microsoft Defender for Endpoint CrowdStrike Falcon RCA escalation Investigation Alert Triage IOC Analysis

Work Experience

SOC Analyst

Accenture

Aug 2021 - Present

Administer and manage IBM QRadar, Splunk, and Microsoft Sentinel for enterprise clients. Onboard and normalize logs from cloud, SaaS, endpoint, firewall, proxy, and custom applications. Develop and fine-tune correlation rules, alerts, dashboards, and use cases. Perform advanced threat hunting using MITRE ATT&CK framework and behavioral analysis. Investigate and respond to security incidents across endpoints, network, and email vectors. Handle complete incident lifecycle (triage → investigation → escalation → closure). Integrate threat intelligence feeds (IOC ingestion via APIs) to enhance detection capability. Reduce false positives by optimizing detection logic and tuning SIEM rules. Monitored SIEM tools (QRadar/Splunk) for real-time security alerts and performed alert triage, classification, and initial investigation. Investigated endpoint alerts using CrowdStrike and Defender and conducted phishing analysis and email threat investigation. Escalated confirmed incidents with detailed analysis to L2/L3 teams. Performed log analysis across firewall, proxy, and endpoint sources. Supported log onboarding and parsing activities in SIEM. Conducted vulnerability assessments using Qualys and Nessus and maintained incident tickets (ServiceNow) ensuring SLA compliance. Followed SOC playbooks and ensured proper documentation. Assisted in improving detection rules and reducing false positives. Analyze phishing emails using Proofpoint and header analysis techniques. Perform malware analysis using sandboxing tools and endpoint telemetry. Create and manage SOC SOPs, runbooks, and incident response procedures. Support Cortex XSOAR automation playbooks for incident response workflows. Conduct risk assessments and log analysis for suspicious activities. Monitor DLP incidents and enforce data protection policies. Collaborate with clients as Primary POC for security incidents and advisory. Prepare and present monthly security reports and metrics dashboards. Perform WAPT testing using Burp Suite & Acunetix and share remediation reports.

Education

M.Sc – Bio Chemistry - Jawaharlal Nehru Technological University

- 2012 · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceApr 2026