Back to Developers
Richa Pandey

Richa Pandey

Threat Intelligence Analyst

Delhi, India 2+ yrs exp 85 · Excellent

About

Threat Intelligence Analyst with 2.6 years of experience at Accenture, delivering end-to-end client-ready advisories covering OSINT-based source validation, IOC enrichment, CVE analysis, and MITRE ATT&CK technique mapping. Proven track record in building Python-based automation pipelines that streamlined threat-intel workflows — including indicator extraction, ransomware leak-site parsing, and advisory generation. Hands-on experience in SOC operations, Splunk-based SIEM alert triage, phishing and malware analysis. CompTIA Security+ certified, with strong ability to translate complex adversary behaviour into actionable intelligence for both technical and executive stakeholders.

Skills & Expertise (16)

OSINT Advanced
8.1/10
3
Years Exp
MITRE ATT&CK Advanced
8.0/10
3
Years Exp
Splunk Advanced
8.0/10
3
Years Exp
Python Advanced
8.0/10
3
Years Exp
CVE analysis Advanced
7.9/10
3
Years Exp
Threat Actor Profiling Advanced
7.9/10
3
Years Exp
Dark Web Monitoring Advanced
7.8/10
3
Years Exp
Alert Triage Advanced
7.8/10
3
Years Exp
Log Analysis Advanced
7.8/10
3
Years Exp
Phishing Analysis Advanced
7.8/10
3
Years Exp
Malware Analysis Advanced
7.8/10
3
Years Exp
TAXII Intermediate
7.5/10
3
Years Exp
Cyber Kill Chain Intermediate
7.5/10
3
Years Exp
Diamond Model Intermediate
7.5/10
3
Years Exp
Postgresql Intermediate
7.5/10
3
Years Exp
MySql Intermediate
7.5/10
3
Years Exp

Work Experience

Security Delivery Associate (Threat Intelligence Analyst)

Accenture Solutions Pvt. Ltd.

Oct 2023 - Present

Drafted and delivered 100+ end-to-end client-ready threat intelligence advisories, covering OSINT-based source validation, IOC verification, CVE enrichment, and MITRE ATT&CK technique mapping for Fortune 500 clients. Designed and built a full Python-based threat-intel automation pipeline — automating link fetching, crawling of trusted threat-intel sources, content extraction, and advisory generation — reducing manual processing time by ~40%. Developed a dedicated parser for the Silent ransomware group to monitor leak-site activity, enabling faster adversary tracking and proactive client alerting. Built MITRE ATT&CK technique-mapping logic in Python, accelerating attribution and advisory enrichment workflows. Investigated and triaged security alerts, phishing emails, and malware indicators using Splunk SIEM; performed log analysis across network, endpoint, and application layers. Developed a Python penetration testing script for internal API endpoint security validation. Managed and maintained the PostgreSQL database for the company’s internal automation tool, ensuring data integrity and availability. Created and maintained operational dashboards to provide team-level visibility into advisory progress, IOC coverage, and threat activity tracking. Presented a detailed end-to-end automation workflow proposal to senior stakeholders, recognised with the ACE Award for Inspiring Innovation and Client Excellence.

Education

Master of Computer Applications (MCA) - LNCTU

2021 - 2023 · Afghanistan

Bachelor of Computer Applications (BCA) - GNDU

2017 - 2020 · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 10/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 85/100

Profile Overview

Member sinceMay 2026