Back to Developers
Naresh K

Naresh K

SOC Analyst

Hyderabad, India
77
Profile Score

About

SOC Analyst with 4+ years of experience in SIEM QRadar, Microsoft Sentinel, CrowdStrike, TCP/IP, Firewalls, IDS/IPS, Windows Event Logs, Phishing Analysis, Malware Analysis, Log Analysis,, Threat Intelligence, Endpoint Security.

Skills & Expertise (13)

SIEM QRadar Phishing Analysis Microsoft Sentinel CrowdStrike TCP/IP Firewalls Windows Event Logs Linux logs ServiceNow VirusTotal Malware Analysis Log Analysis

Work Experience

SOC Analyst

Capgemini Technology Services India Ltd

07-2021 - 03-2022

Maintained up-to-date knowledge of cyber threat landscape by researching latest attack trends and techniques used by attackers. Monitored security alerts and incidents using advanced SIEM tools. Analyzed potential threats by evaluating system vulnerabilities and logs. Reviewed security policies and recommended improvements for compliance. Investigated advanced persistent threats in order to understand their behavior patterns. Documented findings and generated reports for management review. Collaborated with internal teams to improve system performance and enhance overall security posture of the organization's infrastructure.

SOC Analyst

Zensar Technologies

04-2022 - Present

Working in the Security Operations Center (24/7), monitoring SOC events, detecting, and preventing intrusion attempts. Monitored security alerts from SIEM (SENTINEL, QRadar, etc.). And other security tools. Performed initial triage, investigation, and validation of security incidents. Escalated confirmed threats to L2 analysts for deeper analysis. Worked closely with threat intelligence teams for proactive threat detection. Assisted in real-time incident response to potential security threats. Maintained incident logs, reports, and documentation. Followed SOC standard operating procedures (SOPs) for incident handling. Monitored email security alerts (phishing, spam, etc.). Conducted basic malware analysis and URL/domain reputation checks. Collaborated with internal IT teams to troubleshoot security alerts. Generate daily, weekly, and monthly SOC reports with incident metrics, MTTR (Mean time to Respond), incident trends, and threat landscape analysis for management review. Analyze the virus alerts triggered by the endpoint security solutions, and provide the remediation steps to the Client Services Team, and get the suspicious issue fixed. All the suspicious URLs and mail attachments were tested in an isolated machine to avoid spreading malware or viruses on the company's network. Analyzed logs from various sources including web servers, application servers, databases, IDS and IPS systems. for possible security breaches. Created and continuously refined incident response playbooks aligned with NIST and MITRE ATT&CK frameworks, improving SOC efficiency by 25%. Provided executive-level threat intelligence reports, enhancing decision-making. Led the incident response for a high-severity phishing attack, minimizing business impact.

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 18/20
🎓 Education 0/10
⏱️ Experience 14/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 77/100

Profile Overview

Member sinceDec 2025

Availability Details

Visa Status

No Visa

Relocation

Open to Relocation

Skills (13)

SIEM QRadar Phishing Analysis Microsoft Sentinel CrowdStrike TCP/IP Firewalls Windows Event Logs Linux logs ServiceNow +3 more