Back to Developers
Poornesh Tata

Poornesh Tata

$25/hr
70
Profile Score

Skills & Expertise (18)

SIEM (Sentinel, Splunk) Advanced
8.7/10
2
Years Exp
Incident Response Advanced
8.5/10
2
Years Exp
Threat Intelligence Advanced
8.3/10
2
Years Exp
Log Analysis (KQL) Advanced
8.2/10
2
Years Exp
Email/Header Analysis Advanced
8.1/10
2
Years Exp
Networking (TCP/IP, ports, protocols) Advanced
8.0/10
2
Years Exp
MITRE ATT&CK Advanced
8.0/10
2
Years Exp
Malware Analysis Advanced
8.0/10
2
Years Exp
AWS (EC2, S3, IAM) Intermediate
7.5/10
2
Years Exp
Azure (NSGs, VM Security) Intermediate
7.5/10
2
Years Exp
LINUX Intermediate
7.3/10
2
Years Exp
Python Intermediate
6.8/10
2
Years Exp
Git/GitHub Intermediate
6.8/10
2
Years Exp
Data Structures & Algorithms (DSA) Intermediate
6.5/10
2
Years Exp
OOPs Intermediate
6.5/10
2
Years Exp
C/C++ Intermediate
5.8/10
2
Years Exp
Java Intermediate
5.8/10
2
Years Exp
Microsoft Defender Suite (Endpoint, Office 365, Identity, Cloud Apps, Azure Security)

Work Experience

SOC Analyst

ACCENTURE

Oct 2024 - Present

Investigate and neutralize malware infections by analyzing Microsoft Defender for Endpoint telemetry. This includes performing remote isolation of compromised hosts and reviewing process trees and device timelines to identify the root cause of suspicious executions and prevent lateral movement. Mitigate sophisticated email-based threats by performing deep-dive analysis of email headers and attachments within Defender for Office 365. I utilize KQL (Kusto Query Language) to identify and purge similar malicious messages across the entire tenant, effectively reducing the organization's Mean Time to Remediate (MTTR). Execute UEBA-driven investigations of Entra ID Identity Protection alerts. I correlate behavioral anomalies with IP reputation making use of threat intelligence feeds and MFA telemetry to assess identity risk and implement remediation actions that significantly reduce the attack surface. Analyzed and responded to network security incidents by leveraging deep knowledge of TCP/IP and related protocols, conducting log analysis in Microsoft Sentinel to identify anomalies, applying structured incident response procedures for containment and remediation, and utilizing threat intelligence frameworks (including MITRE ATT&CK) to detect Indicators of Compromise and strengthen proactive defense measures. Conducted continuous monitoring, detection, and response to security incidents to maintain a robust security posture. I conduct initial triage and analysis of security alerts, ensuring critical issues are escalated with detailed forensic context to senior analysts for final resolution.

Education

B.Tech in Information Technology - Aditya College of Engineering and Technology, JNTUK Affiliated

2020 - 2024 · India

Certifications

AWS Cloud Practitioner

Amazon Web Services · 2024

Hands-on learning of AWS cloud

Redhat Certified System Administrator

Redhat · 2023

Hands-on Linux administration

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 0/10
✍️ Bio 0/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 5/5
🏆 Certs 5/5
Verified 5/5
Total Score 70/100

Profile Overview

Member sinceFeb 2026

Availability Details

Visa Status

Need Sponsorship

Relocation

Open to Relocation

Skills (18)

SIEM (Sentinel, Splunk) Incident Response Threat Intelligence Log Analysis (KQL) Email/Header Analysis Networking (TCP/IP, ports, protocols) MITRE ATT&CK Malware Analysis AWS (EC2, S3, IAM) Azure (NSGs, VM Security) +8 more