About
Security Operations Center (SOC) Analyst experienced in security monitoring, threat detection, and incident response within enterprise environments. Skilled in analyzing SIEM alerts, investigating suspicious activities, and performing security log analysis. Experienced in identifying cyber threats including phishing attacks, malware infections, brute-force login attempts, and abnormal network behavior. Strong knowledge of networking protocols, Windows and Linux systems, and SOC investigation workflows.
Skills & Expertise (25)
Work Experience
SOC Analyst
AT&T
Jan 2025 - Present
Monitor and analyze security alerts from SIEM platforms including Splunk, IBM QRadar, and Microsoft Sentinel. Investigate phishing attempts, malware alerts, brute-force login attempts, and suspicious network activities. Perform log analysis from firewalls, IDS/IPS systems, servers, and endpoints to detect abnormal behavior. Conduct network traffic analysis using Wireshark to identify malicious communication patterns. Perform IOC analysis using VirusTotal to validate suspicious IP addresses, domains, and file hashes. Assist in SIEM rule tuning and alert optimization to reduce false positives. Manage incidents through ServiceNow ticketing system ensuring proper documentation and escalation. Follow SOC incident response lifecycle including triage, investigation, containment, escalation, and resolution. Investigate Windows and Linux security logs to detect unauthorized access attempts. Collaborate with network and security teams to mitigate potential cyber threats.
Education
Bachelor of Technology (B.Tech) – Electronics and Communication Engineering - JNTUH University
- · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Relocation
Open to Relocation
Skills (25)
Click a skill to find developers with the same skill