Back to Developers
Pruthvi L K

Pruthvi L K

Security Analyst

Bengaluru, Karnataka
80
Profile Score

About

SSOC Analyst with 3+ years of experience in Security Operations Center environments, specializing in threat detection, incident response, and threat hunting. Experienced in analyzing security alerts using SIEM platforms such as Google Chronicle and Sumo Logic, and investigating endpoint activities using CrowdStrike Falcon and Microsoft Defender. Skilled in log analysis, malware investigation, phishing detection, and mapping security events to MITRE ATT&CK techniques. Proven ability to develop detection rules, conduct threat hunting, and respond to security incidents to improve organizational security posture.

Skills & Expertise (25)

Incident Response Advanced
8.0/10
3
Years Exp
Threat Detection Advanced
8.0/10
3
Years Exp
Incident Response Advanced
8.0/10
3
Years Exp
Threat Hunting Advanced
7.8/10
3
Years Exp
SIEM platforms Advanced
7.5/10
3
Years Exp
Google Chronicle Advanced
7.3/10
2
Years Exp
Threat Intelligence Tenable Nessus Email Security DLP WAF Windows Event Logs proxy logs DNS Logs Firewall Logs Log Parsing SIEM detection rule creation YARA-L rule development MITRE ATT&CK Phishing detection Malware Investigation Log Analysis Microsoft Defender CrowdStrike Falcon Sumo Logic

Work Experience

SOC Analyst

Tecplix Technologies Private Limited

Jun 2024 - Present

Monitored and investigated security alerts generated from SIEM platforms such as Google Chronicle and Sumo Logic to identify potential security threats and anomalous activities. Performed continuous monitoring and analysis of firewall, DNS, proxy, and endpoint logs to detect suspicious behavior and possible security incidents. Conducted endpoint investigations using CrowdStrike Falcon and Microsoft Defender for Endpoint to detect malware execution, suspicious processes, and unauthorized activities. Investigated abnormal PowerShell executions, persistence mechanisms, and privilege escalation attempts on endpoints. Performed incident triage and root cause analysis to determine the scope and impact of security incidents and implemented appropriate containment and remediation actions. Coordinated with internal teams to contain and remediate confirmed security incidents, minimizing potential impact to business operations. Conducted proactive threat hunting using IOC-based and hypothesis-driven methodologies to identify advanced threats that bypass automated security controls.

SOC Analyst

Accel IT Services Pvt Ltd

Jan 2022 - Jan 2024

Utilized threat intelligence and mapped detected activities to the MITRE ATT&CK framework to understand attacker behavior and improve detection coverage. Investigated phishing emails, malicious URLs, and suspicious attachments using email security tools and threat intelligence sources. Analyzed unusual outbound network traffic patterns, DNS anomalies, and potential command-and-control communication attempts. Collaborated with SOC engineers and SOAR teams to improve detection capabilities and automate incident response workflows. Documented detailed incident investigation reports, including attack vectors, affected systems, and remediation recommendations. Prepared security reports and threat intelligence updates for internal teams and client stakeholders.

Education

B.E - Jain Institute Of Technology Davangere

- 2021 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation

Skills (25)

Incident Response Threat Detection Incident Response Threat Hunting SIEM platforms Google Chronicle Threat Intelligence Tenable Nessus Email Security DLP +15 more