About
CEH-certified security professional with 4+ years of IT experience, including 2+ years in 24/7 SOC environments. Skilled in monitoring security alerts, analyzing threats, reviewing logs, and supporting incident response across enterprise-scale environments. Hands-on experience with SIEM platforms including Splunk, ArcSight, Seceon, and IBM QRadar — with a strong foundation in networking (TCP/IP, DNS, HTTP, firewalls), Linux and Windows OS, and security tools including Nessus and Wireshark. Strong analytical, documentation, and communication skills. Passionate about continuous learning and staying current on emerging cyber threats.
Skills & Expertise (39)
Work Experience
Network Engineer – Infrastructure & Security Operations
Reliance Industries Limited (E&P KGD6)
Jun 2017 - Jun 2023
Managed Cisco and Juniper network infrastructure (LAN/WAN); monitored network activity for anomalous behavior using SolarWinds, PRTG, and Nagios. Implemented and maintained NGFW security controls using Palo Alto and FortiGate firewalls; conducted regular firewall log reviews and configuration audits. Reviewed system and network logs to identify suspicious patterns, potential policy violations, and security misconfigurations. Designed secure VPN connectivity (IPSec/SSL) for remote users and third-party partners, applying access control and network segmentation best practices.
SOC Analyst – Security Monitoring, Alert Triage & Incident Response
ESDS Software Solutions Limited
Jul 2023 - Present
Monitored 10,000+ security events daily across enterprise SIEM platforms (ArcSight, Splunk, Seceon), reviewing alerts from firewalls, IDS/IPS, EDR, WAF, proxies, and email gateways for suspicious behavior. Analyzed and triaged 1,200+ security alerts per month — identifying malware infections, phishing attempts, brute force attacks, ransomware indicators, and unauthorized access activity. Reviewed firewall logs, network activity, and endpoint telemetry to detect anomalies and potential intrusion indicators, escalating confirmed threats through defined incident response procedures. Supported incident response investigations end-to-end: identifying threat scope, containing affected systems, coordinating with IT teams for remediation, and preparing structured incident reports with timelines, impact, and root cause. Performed basic vulnerability assessments and security checks — flagging misconfigurations in cloud infrastructure, firewalls, and network devices; coordinated remediation with system owners. Maintained detailed incident records and documentation for all security events, ensuring accurate and audit-ready reporting; maintained 95%+ SLA compliance via ServiceNow. Tuned SIEM correlation rules and detection logic to reduce false positives by 20% and improve detection speed by 30% — collaborating with senior analysts on best-practice implementations. Stayed current on emerging cyber threats, CVEs, and attack trends; applied updated IOCs to SIEM tooling to proactively defend against new attack vectors. Worked closely with IT and infrastructure teams to implement security controls and enforce best practices across enterprise endpoints and network segments.
Education
B.Tech – Computer Science Engineering - Aditya University
- · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Need Sponsorship
Relocation
Open to Relocation