About
SOC Analyst with 4+ years of experience in SIEM QRadar, Microsoft Sentinel, CrowdStrike, TCP/IP, Firewalls, IDS/IPS, Windows Event Logs, Phishing Analysis, Malware Analysis, Log Analysis,, Threat Intelligence, Endpoint Security.
Skills & Expertise (13)
Work Experience
SOC Analyst
Capgemini Technology Services India Ltd
07-2021 - 03-2022
Maintained up-to-date knowledge of cyber threat landscape by researching latest attack trends and techniques used by attackers. Monitored security alerts and incidents using advanced SIEM tools. Analyzed potential threats by evaluating system vulnerabilities and logs. Reviewed security policies and recommended improvements for compliance. Investigated advanced persistent threats in order to understand their behavior patterns. Documented findings and generated reports for management review. Collaborated with internal teams to improve system performance and enhance overall security posture of the organization's infrastructure.
SOC Analyst
Zensar Technologies
04-2022 - Present
Working in the Security Operations Center (24/7), monitoring SOC events, detecting, and preventing intrusion attempts. Monitored security alerts from SIEM (SENTINEL, QRadar, etc.). And other security tools. Performed initial triage, investigation, and validation of security incidents. Escalated confirmed threats to L2 analysts for deeper analysis. Worked closely with threat intelligence teams for proactive threat detection. Assisted in real-time incident response to potential security threats. Maintained incident logs, reports, and documentation. Followed SOC standard operating procedures (SOPs) for incident handling. Monitored email security alerts (phishing, spam, etc.). Conducted basic malware analysis and URL/domain reputation checks. Collaborated with internal IT teams to troubleshoot security alerts. Generate daily, weekly, and monthly SOC reports with incident metrics, MTTR (Mean time to Respond), incident trends, and threat landscape analysis for management review. Analyze the virus alerts triggered by the endpoint security solutions, and provide the remediation steps to the Client Services Team, and get the suspicious issue fixed. All the suspicious URLs and mail attachments were tested in an isolated machine to avoid spreading malware or viruses on the company's network. Analyzed logs from various sources including web servers, application servers, databases, IDS and IPS systems. for possible security breaches. Created and continuously refined incident response playbooks aligned with NIST and MITRE ATT&CK frameworks, improving SOC efficiency by 25%. Provided executive-level threat intelligence reports, enhancing decision-making. Led the incident response for a high-severity phishing attack, minimizing business impact.
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
No Visa
Relocation
Open to Relocation