About
Highly skilled SOC Analyst with 2.1 years of hands-on experience in cybersecurity operations. Expertise in threat detection, incident response, and real-time security monitoring using tools like IBM QRadar, ArcSight, Splunk, Sentinel, and LogRhythm. Adept in malware analysis, SIEM investigation, and handling high-severity incidents in 24/7 MSSP environments. Proven ability to enhance the organization’s security posture through collaboration, mitigation, and proactive defence strategies.
Skills & Expertise (24)
Work Experience
Associate Engineer
ATOS
Jan 2024 - Present
Monitored, triaged, and responded to security alerts and events using SIEM tools such as IBM QRadar, ArcSight, LogRhythm, Splunk, and Microsoft Sentinel. Investigated and escalated security incidents based on severity, business impact, and criticality. Performed initial malware analysis, investigated phishing emails, and conducted endpoint threat validation. Collaborated with incident response teams and threat hunters to analyze potential network intrusions and suspicious behaviour. Conducted log analysis from firewalls, IDS/IPS, VPNs, and proxy servers to trace anomalies and identify Indicators of Compromise (IOCs). Documented incident findings, actions taken, and recommendations in clear, concise reports for both technical teams and management. Contributed to the creation and refinement of SOC Standard Operating Procedures (SOPs) to improve operational efficiency and incident response workflows.
Education
Bachelor of Engineering (EEE) - U B D T college of engineering, VTU
- 2022 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Need Sponsorship
Relocation
Open to Relocation