About
SOC Analyst with nearly 2 years of experience in a 24/7 Security Operations Center (SOC) environment, handling 200+ weekly alerts across enterprise infrastructure. Skilled in SIEM monitoring, EDR-based investigations, threat hunting, malware analysis, and incident response lifecycle. Experienced in FortiSIEM, Wazuh, Cortex EDR, and firewall log analysis with strong understanding of MITRE ATT&CK mapping, correlation rule creation, and false-positive reduction.
Skills & Expertise (29)
Work Experience
SOC Analyst
22by7 Business Solutions Pvt Ltd
Mar 2024 - Present
Monitored and triaged 200+ security alerts weekly across malware, phishing, brute-force, and DNS anomalies in a 24/7 SOC environment. Investigated alerts using FortiSIEM correlations, Wazuh log analysis, and Cortex EDR telemetry. Performed weekly threat hunting focused on beaconing behavior, unusual outbound traffic, and bogon IP connections. Built and optimized 10+ SIEM correlation rules, reducing false positives by 25%. Correlated logs from Windows, Linux, firewall, VPN, and endpoint systems to detect attack patterns. Onboarded and configured 5+ new log sources, improving SIEM visibility by 40%. Escalated high-severity incidents following full Incident Response lifecycle procedures. Collaborated with firewall teams to block 20+ malicious IPs/domains identified during investigations. Maintained incident documentation and mapped security events to MITRE ATT&CK techniques. Ensured SLA adherence and timely ticket updates using structured investigation workflows.
Education
B.Tech in Computer Science & Engineering - Presidency University
2017 - 2021 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Need Sponsorship
Relocation
Open to Relocation