About
SOC Analyst L2 with 5+ years of hands-on experience in 24x7 SOC environments, specializing in SIEM operations, advanced threat analysis, and incident response. Extensive experience using Microsoft Sentinel for alert triage, incident investigation, and custom detection rule development with KQL. Proficient in Microsoft Defender (Endpoint, Identity, Cloud) and EDR tools for endpoint threat detection, containment, and remediation. Strong background in malware and phishing analysis, proactive threat hunting, and threat intelligence enrichment using Recorded Future. Proven ability to lead high-severity incident response, mentor L1 analysts, engage stakeholders during critical security events, and continuously improve detection coverage to strengthen organizational security posture.
Skills & Expertise (28)
Work Experience
Security Consultant
Capgemini
09-2022 - Present
Monitored and analyzed SIEM alerts and raised incidents via ServiceNow. Investigated security events including unauthorized access attempts, malware infections, phishing emails, and network anomalies. Performed in-depth log analysis and responded to incidents in coordination with IT teams.
Security Analyst
TCS
06-2020 - 09-2022
Monitored security indicators by correlating and analyzing security logs. Developed anomaly detection dashboards and reports in SIEM tools. Assisted with the development of processes and procedures to improve security operations functions.
Education
MBA - Sun International Institute of Technology and Management
- 2018 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Relocation
Open to Relocation