About
SOC Analyst with 1.2+ years of experience in security monitoring, incident triage, and threat detection using SIEM tools such as Splunk, Microsoft Sentinel, and IBM QRadar. Skilled in log analysis, network traffic analysis, and incident response aligned with MITRE ATT&CK framework. Experienced in identifying and reducing false positives, investigating security alerts, and supporting security operations in cloud and on-prem environments.
Skills & Expertise (34)
Work Experience
L1 SOC Analyst
Nortribu Technologies
Mar 2025 - Present
Monitored 100+ daily alerts and prioritized critical incidents to improve response time. Performed incident triage and reduced false positives by improving alert analysis. Investigated network activity and identified suspicious traffic patterns leading to faster detection. Conducted reconnaissance and security assessments using Nmap. Monitored Snort IDS alerts and escalated incidents based on severity levels. Performed vulnerability scanning using OpenVAS and documented remediation recommendations. Assisted in endpoint threat investigations using Microsoft Defender XDR. Created detailed incident reports improving analysis accuracy and response efficiency.
Education
B-Tech(IT) - GIET Engineering College Affiliated by Jntuk
2020 - 2024 · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation
Skills (34)
Click a skill to find developers with the same skill