About
Monitoring security alerts and notifications from various sources including SIEM (Security Information and Event Management) systems, IDS/IPS (Intrusion Detection/Prevention Systems), and firewall logs to detect potential security incidents. Having 1.6 years of experience in Incident response with SIEM tools like Microsoft Sentinel and Splunk. Conducted initial analysis and triage of security events to determine their severity and relevance, following established procedures and protocols. Documented and escalated security incidents according to defined procedures, providing detailed information for further investigation by senior analysts or incident response teams. Contributed to the development and improvement of SOC processes and procedures, identifying areas for enhancement based on experience and industry best practices. Collaborated with other members of the SOC team to share knowledge and expertise, fostering a culture of continuous learning and improvement. Provided support and guidance to end-users and other stakeholders regarding security-related inquiries and incidents, promoting awareness of security best practices and policies. Assisted in the maintenance and tuning of security monitoring tools and systems to improve detection capabilities and reduce false positives. Responded to security incidents in a timely manner, coordinating with other teams as necessary to contain and mitigate potential threats to the organization's infrastructure and data and Performing the Malware analysis. Working on Email security tools like Phisher & O365 and conducting the phishing analysis and taking immediate actions on the phishing emails.
Skills & Expertise (13)
Work Experience
Engineer
Shakya Hr Solutions Private Limited
Sep 2024 - May 2025
Worked as an Engineer at Shakya Hr Solutions Private Limited. Experience in monitoring log sources, correlating, analyzing security events and integrating the security devices with SIEM tools like Azure Sentinel. Demonstrated strong analytical and problem-solving skills, with the ability to investigate and resolve complex security incidents effectively. Prepared and delivered reports on security incidents, trends, and metrics to management and stakeholders, helping to inform decision-making and resource allocation. Basic Knowledge on the KQL and pulling the logs according to the client requirement. Proactively identified emerging threats and vulnerabilities through continuous monitoring of security alerts and advisories, ensuring timely implementation of necessary controls and patches. Conducted initial analysis and triage of security events to determine their severity and relevance, following established procedures and protocols. Working on Azure sentinel dashboards by collecting IOC things to determine True positive or False Positive. Experience in creating SOP Run books by taking detailed Triage. Working on Email security tools like Phisher & Proof Point. Worked with core teams to investigate the false and true positive alerts. Preparing daily, weekly and monthly reports as per client requirements. Responsible for monitoring infrastructure health, security and capacity, and make decisions on the security incidents that occurs in the environment. Determine the scope of security incident and its potential impact to Client network recommend steps to handle the security incident with all information and supporting evidence of security events. Experience in collaborating with cross-functional teams, including security operations, incident response, and IT operations, to ensure timely and effective incident response. Maintained up-to-date knowledge of emerging threats and vulnerabilities, attending relevant training sessions and staying informed about the latest trends in Cyber security.
Security Analyst
Capgemini
May 2025 - Present
Working as a Security Analyst at Capgemini, Bangalore. Experience in monitoring log sources, correlating, analyzing security events and integrating the security devices with SIEM tools like Azure Sentinel. Demonstrated strong analytical and problem-solving skills, with the ability to investigate and resolve complex security incidents effectively. Prepared and delivered reports on security incidents, trends, and metrics to management and stakeholders, helping to inform decision-making and resource allocation. Basic Knowledge on the KQL and pulling the logs according to the client requirement. Proactively identified emerging threats and vulnerabilities through continuous monitoring of security alerts and advisories, ensuring timely implementation of necessary controls and patches. Conducted initial analysis and triage of security events to determine their severity and relevance, following established procedures and protocols. Working on Azure sentinel dashboards by collecting IOC things to determine True positive or False Positive. Experience in creating SOP Run books by taking detailed Triage. Working on Email security tools like Phisher & Proof Point. Worked with core teams to investigate the false and true positive alerts. Preparing daily, weekly and monthly reports as per client requirements. Responsible for monitoring infrastructure health, security and capacity, and make decisions on the security incidents that occurs in the environment. Determine the scope of security incident and its potential impact to Client network recommend steps to handle the security incident with all information and supporting evidence of security events. Experience in collaborating with cross-functional teams, including security operations, incident response, and IT operations, to ensure timely and effective incident response. Maintained up-to-date knowledge of emerging threats and vulnerabilities, attending relevant training sessions and staying informed about the latest trends in Cyber security.
Education
B.Tech - JNTU Anantapur
- · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation