Back to Developers
Nithish

Nithish

Security Analyst

80
Profile Score

About

To build my career in Cybersecurity that promotes learning and growth with a team where my acquired skills will be utilized for the betterment of the company.

Skills & Expertise (15)

Azure Sentinel Intermediate
7.5/10
1
Years Exp
CyberSecurity Intermediate
7.5/10
1
Years Exp
Security Incident Response Intermediate
7.4/10
1
Years Exp
SIEM platforms Intermediate
7.3/10
1
Years Exp
Alert Investigation Intermediate
7.2/10
1
Years Exp
Phishing Analysis Intermediate
7.2/10
1
Years Exp
SOC process Intermediate
7.0/10
1
Years Exp
Microsoft Defender Intermediate
6.9/10
1
Years Exp
Malware Analysis Intermediate
6.8/10
1
Years Exp
DLP Intermediate
6.8/10
1
Years Exp
Threat Intelligence Intermediate
6.8/10
1
Years Exp
Splunk Enterprise Intermediate
6.5/10
1
Years Exp
Vulnerability Management Intermediate
6.5/10
1
Years Exp
IBM QRadar Intermediate
6.5/10
1
Years Exp
Networking Protocols Intermediate
6.0/10
1
Years Exp

Work Experience

SOC Analyst

Amazon

Oct 2022 - Present

Proactively monitor and analysis of alerts on Azure Sentinel Security Information and Event Management (SIEM) to identify suspicious activity or anomalies. Monitor, analysis, detect and provide proper incident response to all the security triggered alerts from Security tools and other security solutions. Thoroughly investigate, promptly report, document and raise tickets for valid incidents to the appropriate resolution teams. Perform root cause analysis for security incidents. Utilize open-source tools to investigate malicious phishing emails, domains, IPs, URLs and providing recommendations for proper blocking based on the analysis. Hands on experience of current and upcoming analysis tools like VirusTotal, VMRay, IPVoid, URLScan, Zscaler Site Review, AbuseIPDB. Respond to cyberthreats in real-time, resolving cases with comprehensive documentation and investigation. Acknowledge and take necessary actions on user reported emails, Office Data Loss Prevention and Endpoint Data Loss Prevention. Utilize manual ticketing system like SNOW to raise tickets based on investigations and analysis. Adhere to SLAs for incident acknowledgement and resolution and make regular follow-ups till the closure of the incident and good understanding of SOC processes like Standard Operating Procedures (SOP), Playbooks and documentation. Fine-tune the SIEM Use case for the reduction of false positive alerts. Able to perform true and false positive Log analysis. Responsible for preparing weekly and monthly SOC reports. Assist L2 and L3 in priority incidents and drafting shift handover.

Education

Bachelor of Engineering - GMRIT, RAJAM JNTUK

2019 - 2022 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Skills (15)

Azure Sentinel CyberSecurity Security Incident Response SIEM platforms Alert Investigation Phishing Analysis SOC process Microsoft Defender Malware Analysis DLP +5 more