Back to Developers
Pallemoni Nirosh

Pallemoni Nirosh

SOC Analyst

Hyderabad, India
74
Profile Score

About

SOC Analyst with 3.6 years of experience in 24/7 Security Operations Center (SOC) environments. Expertise in Incident Detection, Security Event Analysis, Threat Hunting, Email Security, Malware Investigation, and Vulnerability Management.

Skills & Expertise (9)

Azure Sentinel Advanced
8.8/10
3.6
Years Exp
7
Proficiency
6
Experience
10
Recency
9
Demand
Microsoft Defender Advanced
8.8/10
3.6
Years Exp
7
Proficiency
6
Experience
10
Recency
9
Demand
CrowdStrike Advanced
8.8/10
3.6
Years Exp
7
Proficiency
6
Experience
10
Recency
9
Demand
KQL Advanced
8.8/10
3.6
Years Exp
7
Proficiency
6
Experience
10
Recency
9
Demand
Incident detection Advanced
8.8/10
3.6
Years Exp
7
Proficiency
6
Experience
10
Recency
9
Demand
Security event analysis Advanced
8.8/10
3.6
Years Exp
7
Proficiency
6
Experience
10
Recency
9
Demand
Threat Hunting Advanced
8.8/10
3.6
Years Exp
7
Proficiency
6
Experience
10
Recency
9
Demand
Email Security Advanced
8.8/10
3.6
Years Exp
7
Proficiency
6
Experience
10
Recency
9
Demand
Vulnerability Management Advanced
8.8/10
3.6
Years Exp
7
Proficiency
6
Experience
10
Recency
9
Demand

Work Experience

Investigation Specialist

AMAZON

12-2023 - 01-2025

Investigated malware, phishing and suspicious IP traffic from SIEM alerts. Performed EDR isolation and malware remediation using Microsoft Defender & CrowdStrike. Analyzed threat intel using VirusTotal, AbuseIPDB, URLScan, MX Toolbox for suspicious domains/URLs. Investigated Azure AD logs (failed authentications, brute force attempts, unauthorized privilege changes).

Investigation Specialist

AMAZON

12-2023 - 01-2025

Investigated malware, phishing and suspicious IP traffic from SIEM alerts. Performed EDR isolation and malware remediation using Microsoft Defender & CrowdStrike. Analyzed threat intel using VirusTotal, AbuseIPDB, URLScan, MX Toolbox for suspicious domains/URLs. Investigated Azure AD logs (failed authentications, brute force attempts, unauthorized privilege changes).

Investigation Specialist

AMAZON

12-2023 - 01-2025

Investigated malware, phishing and suspicious IP traffic from SIEM alerts. Performed EDR isolation and malware remediation using Microsoft Defender & CrowdStrike. Analyzed threat intel using VirusTotal, AbuseIPDB, URLScan, MX Toolbox for suspicious domains/URLs. Investigated Azure AD logs (failed authentications, brute force attempts, unauthorized privilege changes).

Process Executive

INFOSYS

09-2021 - 12-2023

Triaged and investigated 700+ alerts/month including phishing, malware, brute-force and suspicious login attempts. Performed advanced threat hunting using KQL to identify user anomalies and lateral movement. Blocked attackers through ProofPoint by isolating malicious emails and enforcing MFA reset workflows. Reduced noise by 18% through alert tuning, correlation rule modifications and use case refinement. Generated Daily SOC dashboards, Incident RCA reports, MIM updates, weekly & monthly SOC reports.

Process Executive

INFOSYS

09-2021 - 12-2023

Triaged and investigated 700+ alerts/month including phishing, malware, brute-force and suspicious login attempts. Performed advanced threat hunting using KQL to identify user anomalies and lateral movement. Blocked attackers through ProofPoint by isolating malicious emails and enforcing MFA reset workflows. Reduced noise by 18% through alert tuning, correlation rule modifications and use case refinement. Generated Daily SOC dashboards, Incident RCA reports, MIM updates, weekly & monthly SOC reports.

Process Executive

INFOSYS

09-2021 - 12-2023

Triaged and investigated 700+ alerts/month including phishing, malware, brute-force and suspicious login attempts. Performed advanced threat hunting using KQL to identify user anomalies and lateral movement. Blocked attackers through ProofPoint by isolating malicious emails and enforcing MFA reset workflows. Reduced noise by 18% through alert tuning, correlation rule modifications and use case refinement. Generated Daily SOC dashboards, Incident RCA reports, MIM updates, weekly & monthly SOC reports.

Senior Associate

CANTERR IT SERVICES

01-2025 - 04-2025

Conducted security event monitoring and analysis by investigating SIEM alerts related to malware, phishing attempts, and anomalous user behavior. Performed threat hunting using KQL queries to identify lateral movement indicators, compromised accounts, and unusual authentication patterns. Executed endpoint containment and remediation actions using Microsoft Defender and CrowdStrike, including isolation of infected hosts and removal of malicious artifacts. Analyzed suspicious domains, URLs and IPs using tools such as VirusTotal, AbuseIPDB, URLScan, and MX Toolbox to support incident investigations. Reviewed Azure AD activity logs to identify failed login spikes, brute force attempts, and unauthorized privilege escalations. Assisted in triaging email-based threats by isolating malicious messages and coordinating remediation workflows. Contributed to SOC reporting by preparing daily dashboards, incident summaries, and weekly operational updates. Participated in tuning correlation rules and refining alert use cases to minimize false positives and enhance SOC detection capabilities.

Senior Associate

CANTERR IT SERVICES

01-2025 - 04-2025

Conducted security event monitoring and analysis by investigating SIEM alerts related to malware, phishing attempts, and anomalous user behavior. Performed threat hunting using KQL queries to identify lateral movement indicators, compromised accounts, and unusual authentication patterns. Executed endpoint containment and remediation actions using Microsoft Defender and CrowdStrike, including isolation of infected hosts and removal of malicious artifacts. Analyzed suspicious domains, URLs and IPs using tools such as VirusTotal, AbuseIPDB, URLScan, and MX Toolbox to support incident investigations. Reviewed Azure AD activity logs to identify failed login spikes, brute force attempts, and unauthorized privilege escalations. Assisted in triaging email-based threats by isolating malicious messages and coordinating remediation workflows. Contributed to SOC reporting by preparing daily dashboards, incident summaries, and weekly operational updates. Participated in tuning correlation rules and refining alert use cases to minimize false positives and enhance SOC detection capabilities.

Senior Associate

CANTERR IT SERVICES

01-2025 - 04-2025

Conducted security event monitoring and analysis by investigating SIEM alerts related to malware, phishing attempts, and anomalous user behavior. Performed threat hunting using KQL queries to identify lateral movement indicators, compromised accounts, and unusual authentication patterns. Executed endpoint containment and remediation actions using Microsoft Defender and CrowdStrike, including isolation of infected hosts and removal of malicious artifacts. Analyzed suspicious domains, URLs and IPs using tools such as VirusTotal, AbuseIPDB, URLScan, and MX Toolbox to support incident investigations. Reviewed Azure AD activity logs to identify failed login spikes, brute force attempts, and unauthorized privilege escalations. Assisted in triaging email-based threats by isolating malicious messages and coordinating remediation workflows. Contributed to SOC reporting by preparing daily dashboards, incident summaries, and weekly operational updates. Participated in tuning correlation rules and refining alert use cases to minimize false positives and enhance SOC detection capabilities.

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 14/20
🎓 Education 0/10
⏱️ Experience 15/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 74/100

Profile Overview

Member sinceJan 2026

Availability Details

Current Company

Amazon Global Selling

Visa Status

No Visa

Relocation

Open to Relocation

Skills (9)

Azure Sentinel Microsoft Defender CrowdStrike KQL Incident detection Security event analysis Threat Hunting Email Security Vulnerability Management