Back to Developers
Pavan More

Pavan More

Information Security Analyst-L1

80
Profile Score

About

3 Years of experience in information security professional with strong Cyber Security, management skills & soaring interest in cutting edge security trends that require profound reading and experimentation. Fully committed to understand and re-invent processes to develop innovative approach towards problem solving. Always eager to learn more tricks from all team members adding to holistic knowledge gain in a way that is beneficial to the company while enhancing productivity and reputation.

Skills & Expertise (68)

SIEM Advanced
8.6/10
3
Years Exp
Security Operations Advanced
8.3/10
3
Years Exp
Incident Response Advanced
8.1/10
3
Years Exp
Azure Linux system administration AWS Hpsm Dos Incident Reports SOC dashboards Sla Threat Detection CyberSecurity Incident Management Threat Intel Feeds Use Cases Implementation Malware Attacks Database IAM IPS Security Hardening Endpoint Protection Malware Analysis Threat Intelligence Threat Hunting LAN Vulnerability Management Risk Assessment patching Remediation Triage Containment Reporting Compliance requirements Crowd strike Investigation Suspicious Email Analysis Checkpoint Sophos Fortinet Firewall Suspicious File Analysis Microsoft Defender QRadar EDR Q-Radar Splunk ArcSight Rules SIEM Network architecture Security monitoring WAF DLP Prisma IDS PaloAlto Wildfire Incident Handling Log Analysis Deep investigation presentations Dashboards Reports Domains Proxy Email Gateway Security Solutions

Work Experience

Security Operations Analyst L1

Amdocs

May 2024 - Present

Security Operation, Event detection & Investigation (L1): Qradar and Splunk- day to day operations & perform real-time proactive security monitoring detection & response to security events & offence for Enterprise infrastructure. Crowd strike, DLP, Prisma- Casb IPS/IDS, FireEye AX, PaloAlto, Wildfire, PaloAlto Cortex, Attivo, Smokescreen, IBM Guardian, Incident Handling, Internal Policies, Log analysis &Deep investigation, Presentations, Dashboards & Reports. Review security-related events, reports & incidents escalated by SOC engineers (L1), assessing severity, criticality and priority. Blocked malicious URLs, IP addresses, senders, and domains at proxy, firewall, and email gateway levels to enhance perimeter defenses. Block IOCs on Security solutions. Recognize attacks based on their signatures/trends/patterns. Conduct thorough investigation of security events generated by our detection mechanisms such as SIEM, EDR, IDS/IPS, WAF, Firewall, Proxy, and Database. Incident Handling, Investigate, collaborate and report on root-cause-analysis of malware attacks. Knowledge of Implementation of new rules and use cases. Review & Fine tuning of existing & recently implemented use cases. Implementation of various ideas in current project and developed the processes. Investigate a threat and correlate it with multiple implemented security platforms and analyze the historical to current research-based scenario to take appropriate actions. Developed many incident management’s processes and response processes to improve respond time and configured latest IOCs to detect/prevent attack on time. Implemented best practices for incident response and investigation, correlation trainings for team to maintain the SLA. Implemented Play-books for investigation steps & response. Conducted sessions & trainings on Use-Case, Playbooks & Cybersecurity related topics. Collating and blocking of the IOC’s which are received from different Threat Intel Feeds.

SOC Analyst L1 – Security Operations

Mastercard

May 2023 - May 2024

Investigated L1 security incidents using Splunk SIEM across network, endpoint, and cloud logs. Reduced false positives by ~30% through SIEM correlation rule tuning and alert optimization. Detected and escalated potential security compromises through pattern analysis in real-time alert monitoring. Continuously monitor networks and systems for security breaches, anomalies, and suspicious activity (often using SIEM tools). Managed DDoS alerts and coordinated mitigation within SLA. Created SOC dashboards and incident reports for management and audits. Specialized in DoS/DDoS attack mitigation using Arbor tools. Experienced in HPSM and OSM for incident management and security ticketing. Skilled in Netscout solutions for traffic analysis and threat detection. Hands-on experience in AWS and Azure cloud security (IAM, monitoring, incident response). Strong expertise in Linux system administration and security hardening. Proficient in EDR solutions including CrowdStrike for endpoint protection. Experienced in SIEM operations including use case development, log analysis, and alert tuning. Knowledgeable in malware analysis, threat intelligence, and threat hunting. Strong background in LAN/WAN network security and monitoring. Experienced in vulnerability management, risk assessment, patching, and remediation. Skilled in incident response including triage, investigation, containment, and reporting. Ability to secure on-premise and cloud-based enterprise environments Adept at aligning security operations with organizational goals and compliance requirements.

Education

Bachelor of Engineering - Shivaji University

- · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Availability Details

Relocation

Open to Relocation