About
Possess over 4 years of experience in the IT industry, including more than 3 years of relevant experience in SOC monitoring and incident response. Skilled in monitoring and analysing security events across the network, mitigating potential security breaches, and ensuring compliance. Expertise in tools like Microsoft Azure Sentinel, Defender 365 Endpoint, and Microsoft Defender ATP. A strong team player with a proven ability to work closely with Cross functional teams to enhance cybersecurity posture and response time.
Skills & Expertise (26)
Work Experience
Senior Associate security analyst
NTT global data and cloud infrastructure pvt ltd
Jun 2021 - Jul 2024
Primary focus on the analysis of Investigation. To identify, True positive or False positive. Responsible for following all the steps in Incident Response Process and to create tickets in Service now Ticket tracking tool. Working on the detailed analysis of the malware and to identify the point of infection using the logs from the tools such as Firewall logs. Experience in Incident Response Life Cycle. Investigating and identifying new attacker methods. Identify opportunities for process automation to optimize day-to-day operations. Constantly look for opportunities to improve security rules and detections. Building solid relationships with stakeholders and colleagues. Analysing data and presenting findings to colleagues. Participate in weekly and monthly review calls with Customer. Understanding the incident is based on determining whether it’s false or true positive. Monitoring and identify positive security events from Splunk & Microsoft Azure sentinel dashboard, Orion during the shift hours and take necessary action for the critical events that is seen during each shift’s hours with deviations for all the environments that we support. Responsible for preparing and submitting the Weekly Security Metrics Report and Weekly SLA Metrics to the client. Creating (KBAs) Knowledge base articles for each tool on their process and how to work on the incidents. Worked on Vulnerability Assessment using the Tool Nessus. Experience in creating SOP Runbooks for the alerts generating in Splunk & Azure sentinel. Working as a SPOC for the client for the last three years. Primary focus on the analysis of Phishing/Spam mail campaigns. To identify, contain and remediate spam incidents. Performing Vulnerability scans on the servers and reporting to patch management team Performed Discovery scans and credentialed scans over the network.
Information security analyst
Accenture
Jul 2024 - Present
Monitored security dashboards and logs to differentiate between true positives and false positives, reducing false alert rates and improving response efficiency. Developed and maintained Standard Operating Procedures (SOPs) and Runbooks for effective incident triage, ensuring a streamlined and consistent incident response process. Managed incident response processes including health checks, security monitoring, and capacity management, maintaining optimal SOC performance. Conducted real-time SOC operations, analysing logs from multiple security appliances, and responding to security breaches in a timely manner. Performed vulnerability assessments using Tenable Nessus and collaborated with internal teams to ensure prompt remediation. Produced and delivered weekly security reports and SLA metrics to stakeholders, ensuring transparency and effective communication. Analysed phishing attacks, malware infections, and unauthorized access incidents, driving rapid containment and remediation efforts. Collaborate with L2/L3 team members and stakeholders to efficiently resolve security incidents.
Education
Bachelor of Technology (B Tech) - JNTU Anantapur
- 2018 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation