Back to Developers
pramod chougule

pramod chougule

Information Security Analyst

Pune, Maharashtra
80
Profile Score

About

Result oriented professional with experience in Information technology and proven knowledge of Information security. Aiming to leverage my skills to successfully fill the Security Analyst role at your company.

Skills & Expertise (32)

SOC (Security Operation Center) Advanced
8.6/10
3
Years Exp
SIEM (Security Information and Event Management) Advanced
8.4/10
3
Years Exp
SIEM Alert Investigation Advanced
8.4/10
3
Years Exp
Log Analysis Advanced
8.4/10
3
Years Exp
Network Security Advanced
8.4/10
3
Years Exp
Network Traffic Analysis Advanced
8.2/10
3
Years Exp
Cyber Threat Hunting Advanced
8.2/10
3
Years Exp
Cloud Security Advanced
8.2/10
3
Years Exp
Incident Security Advanced
8.2/10
3
Years Exp
Splunk Advanced
8.2/10
3
Years Exp
Endpoint Security Advanced
8.1/10
3
Years Exp
Cybersecurity Frameworks Advanced
8.0/10
3
Years Exp
Use Cases Design Advanced
8.0/10
3
Years Exp
MITRE ATT&CK framework Advanced
8.0/10
3
Years Exp
Cyber Kill Chain methodology Advanced
8.0/10
3
Years Exp
Azure Security Tools Advanced
8.0/10
3
Years Exp
Compliance Standards Advanced
8.0/10
3
Years Exp
Phishing Email Analysis Advanced
8.0/10
3
Years Exp
Firewall Management Advanced
8.0/10
3
Years Exp
IDS/IPS Advanced
8.0/10
3
Years Exp
Malware Analysis Advanced
8.0/10
3
Years Exp
MS Defender Advanced
8.0/10
3
Years Exp
CrowdStrike Advanced
8.0/10
3
Years Exp
MS Sentinel Advanced
8.0/10
3
Years Exp
DNS Monitoring Advanced
7.8/10
3
Years Exp
Antivirus Solutions Advanced
7.8/10
3
Years Exp
TCP/UDP Advanced
7.8/10
3
Years Exp
Routing Advanced
7.8/10
3
Years Exp
Switching Advanced
7.8/10
3
Years Exp
Protocols Advanced
7.8/10
3
Years Exp
Proxy Advanced
7.6/10
3
Years Exp
ServiceNow Advanced
7.6/10
3
Years Exp

Work Experience

Information Security Analyst

Deloitte

May 2023 - Present

Working in Security Operation Center (24x7), monitoring of SOC events, detecting and preventing the Intrusion attempts. Monitor security alerts and events from various security tool (SEIM, EDR, IDS/IPS Firewall, etc.). Monitoring real-time events using SIEM tools like Splunk, MS Sentinel. Create and maintain detailed documentation of incidents, action taken and outcomes. Provide input to improve SOC playbooks and detection rules. Stay updated with the latest cyber threats vulnerabilities and threat actor tactics. Monitoring, analyzing and responding to infrastructure threats and vulnerabilities. Investigate the security logs, mitigation strategies and responsible for preparing generic security incident reports. Monitor security alerts and events from cloud-native security tools (like AWS, Azure Security Center, Google Security Command Center) and SIEM integrations. Analyzing daily, weekly and monthly reports. Creating the tickets in ticketing tool. Acted as a security incident handler for advanced attack following Cyber Kill Chain Methodology and MITRE ATT&CK Framework. Having Good communication skills, both verbal and written, with the ability to express complex. Ability to collaborate and communicate effectively and respectfully with both business-oriented. Skilled in managing CrowdStrike, MS Defender and other enterprise-grade security tools. Performs cyber threat hunting on Indicators of Compromise (IoC’s) through our security tools (EDR, SIEM, SOAR, etc.) to detect prior compromise. Hands on experience on designing, implementing Use Cases (Rules, Reports, Dashboard) on SIEM solution. Experience of performing security monitoring and incident response activities in an advanced Security Practical expertise in network traffic analysis (TCP/UDP, Routing, Switching, Protocols)to identify anomalies and detect intrusion attempts. Analyze on request the maliciousness of packages and files in our sandbox and formalize synthesis. operation centers (SOC) environment (log analysis, event analysis, incident investigation, reporting) Experience and knowledge in investigating incidents, remediation, tracking and follow-up for incident closure with concerned team Having Strong knowledge of cybersecurity frameworks and compliance standards. Collecting the logs of all the network devices and analyze the logs to find the suspicious activities. Classify incidents based on criticality and impact to business operation.

Education

Bachelor of Computer Science - Shivaji University Kolhapur

- · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Need Sponsorship

Relocation

Depends on Offer

Skills (32)

SOC (Security Operation Center) SIEM (Security Information and Event Management) SIEM Alert Investigation Log Analysis Network Security Network Traffic Analysis Cyber Threat Hunting Cloud Security Incident Security Splunk +22 more