Back to Developers
Nikhil sai

Nikhil sai

SOC Analyst

Hyderabad
80
Profile Score

About

Experienced SOC Analyst with 4 years of combined expertise in cybersecurity and network engineering. Adept at threat detection, incident response, and managing network security operations. Proficient in leveraging SIEM tools like IBM Q-Radar, Google SecOps, and Splunk to identify and mitigate security threats in real time. Demonstrated success in reducing false positives, blocking phishing and malware threats, and strengthening security posture through proactive defence measures and continuous process improvement.

Skills & Expertise (15)

Incident Response Advanced
8.2/10
4
Years Exp
Log Analysis Advanced
8.0/10
4
Years Exp
Phishing Investigation Advanced
7.9/10
4
Years Exp
Malware Analysis Advanced
7.8/10
4
Years Exp
Endpoint Security Advanced
7.6/10
4
Years Exp
Microsoft Defender for Endpoint (EDR) Cortex XDR CrowdStrike Falcon IBM Q-radar Google SecOps Splunk Load Balancers Network Security Groups (NSGs) Virtual Private Networks (VPNs) ServiceNow

Work Experience

Azure Network Engineer

Tata Consultancy Services

Mar 2022 - Mar 2023

Managed Azure network infrastructure, including virtual networks, subnets, and Network Security Groups (NSGs) to ensure secure and efficient connectivity. Configured and maintained VPNs, load balancers, and other network components to support secure remote access and load distribution. Implemented network security controls in line with organizational policies and compliance requirements. Monitored network performance, identified bottlenecks, and resolved connectivity and latency issues to ensure optimal uptime. Collaborated with clients to understand their technical requirements and issues, delivering timely and effective solutions aligned with business needs.

SOC Analyst

Tata Consultancy Services

Apr 2023 - Present

Monitored and analysed security events using Microsoft Defender to enable real-time threat detection and effective incident response. Operated within a 24x7 Security Operations Centre (SOC), utilizing IBM Q-Radar, Google SecOps, and Splunk for continuous security monitoring, analysis, and incident detection. Utilized open-source tools to investigate, identify, and block malicious domains, IP addresses, and URLs through structured threat analysis. Worked in a shared SOC environment, managing multiple client accounts by performing incident analysis, investigation, and response within defined Service Level Agreements (SLAs). Investigated and responded to various security incidents including malware infections, phishing attacks, and unauthorized access attempts. Collaborated with cross-functional teams to identify, assess, and mitigate security risks, ensuring compliance with organizational security policies. Conducted routine security assessments to detect vulnerabilities and remediate potential threats. Provided training and knowledge sharing to junior analysts on cybersecurity tools, processes, and best practices. Created detailed weekly and monthly reports on security metrics and incident trends; contributed to team development through regular training sessions. Proficient in using ticketing tools such as ServiceNow for incident tracking and workflow management.

Education

Bachelor of Technology (B.Tech) in Computer Science - KKR & KSR Institute of Technology and Sciences

- 2020 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Skills (15)

Incident Response Log Analysis Phishing Investigation Malware Analysis Endpoint Security Microsoft Defender for Endpoint (EDR) Cortex XDR CrowdStrike Falcon IBM Q-radar Google SecOps +5 more