About
Security Analyst with 4 years of experience in threat detection, incident response, and vulnerability management. Skilled in Microsoft Sentinel, Defender XDR, and Azure Logic Apps for SIEM and SOAR operations. Proficient in DLP policy enforcement using Microsoft Purview and cloud posture management with Defender for Cloud and Wiz. Strong knowledge of MITRE ATT&CK and CIS benchmarks.
Skills & Expertise (26)
Work Experience
Security Analyst
Altimetrik India Pvt Ltd
Feb 2022 - Present
Improved cloud infrastructure hygiene using tools such as Microsoft Defender for Cloud, Wiz, and Azure CSPM by identifying misconfigurations, weak controls, and compliance gaps. Managed continuous asset discovery and ensured consistent vulnerability scan coverage across cloud and on-prem systems, maintaining accurate asset databases. Administered and tuned SIEM platforms like Microsoft Sentinel and Splunk, leveraging KQL to build efficient queries for event correlation and advanced threat detection. Collaborated with CISO and GRC teams to fine-tune DLP policies via Microsoft Purview, enforce controls, generate compliance reports, and enhance data loss governance. Creating and managing preventive policies in CrowdStrike EDR. Understanding host groups and policies in CrowdStrike EDR Monitored and analyzed alerts in SIEM platforms (Azure Sentinel, Splunk), correlating events using KQL and escalating significant threats following playbooks and incident response protocols. Responded to endpoint threats using Defender XDR, implemented ASR rules, managed Intune-based onboarding, and ensured protection policies were aligned with compliance and threat prevention requirements. Deployed and managed vulnerability scans using tools such as Qualys, Nessus, Microsoft Defender, and CrowdStrike, ensuring timely assessment cycles and prioritizing remediation based on CVSS scores and business risk. Enforced identity security policies through Azure Entra ID, setting up RBAC, enforcing MFA, and applying Conditional Access rules to manage secure access. Spearheaded the handling of phishing, BEC, and spoofing incidents using Microsoft Defender for O365 and Abnormal Security, improving email threat protection workflows. Designed and executed Logic Apps Playbooks within Microsoft Sentinel to automate alert enrichment, ticket creation, and response workflows, significantly improving SOC response time. Reviewed and optimized SOC playbooks and Standard Operating Procedures (SOPs) to ensure alignment with current threat models and business processes. Identified and remediated alerting platform gaps, proposed enhancement strategies to SOC engineering, and optimized use of security analytics platforms. Monitored alerts from DLP systems, ensured effective policy enforcement, and contributed to ongoing policy tuning and alert prioritization. Provided mentorship to junior SOC analysts in interpreting scan results, managing incidents, and ensuring proper documentation and escalation procedures. Conducted network threat analysis using Netskope CASB, Akamai WAF, and Fortinet firewall logs to detect anomalies and protect sensitive business data. Created executive-ready dashboards and operational reports for vulnerability management, threat trends, and policy violations, improving transparency for leadership. Delivered emergency on-call support for critical security incidents, collaborating with IR teams to ensure timely resolution and impact minimization. Aligned SOC and vulnerability processes with standards such as MITRE ATT&CK, OWASP Top 10, CIS Benchmarks, and other regulatory frameworks. Engaged in risk mitigation for DLP alerts, communicated effectively with stakeholders and data owners, and drove continuous improvement in protection strategies.
Education
B.Tech - JNTU, Anantapur
2018 - · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Need Sponsorship
Relocation
Open to Relocation