Back to Developers
CK

Chapala Krishna

DFE | DFIR | Proofpoint Certified Email Authentication Specialist

Hyderabad, India
70
Profile Score

About

I bring nearly 2.8 years of dedicated experience in cyber security, specialising in Security Incident Response and SOC operations, with strong expertise in incident detection, analysis, and root cause resolution. I have hands-on proficiency with a robust range of security technologies —Abnormal Security, CrowdStrike, Mimecast, Proofpoint, Netskope, Splunk, Microsoft defender, Datadog, Infoblox, XSOAR, CASB, CyberTriage and cloud platforms such as Azure and AWS. My experience extends to vulnerability management using Tenable.io and leveraging Elastic ELK (Kibana) for comprehensive SIEM and log analysis. Additionally, I execute threat-hunting initiatives using queries mapped to the MITRE ATT&CK framework, guided by actionable threat intelligence.

Skills & Expertise (16)

Security Incident Response SOC Operations Incident detection Incident analysis Abnormal Security CrowdStrike Mimecast ProofPoint Netskope Splunk Microsoft Defender Datadog Xsoar CASB Azure AWS

Work Experience

SOC Analyst

Franklin Templeton Investments

March-2023 - Present

Provide 24/7 monitoring and support to ensure the security and integrity of the organization's IT infrastructure. Investigate phishing emails, identify malicious content, and mitigate potential threats. Utilize security tools such as Mimecast, Proofpoint, Abnormal Security, Infoblox, CrowdStrike, Microsoft Defender XSOAR, and CASB to safeguard systems. Perform threat-hunting initiatives using queries mapped to the MITRE ATT&CK framework, guided by actionable threat intelligence. Experienced in analyzing security alerts for Azure and AWS environments. Use Forcepoint DLP and Netskope to protect sensitive data and Tenable.io for vulnerability scanning and management. Monitor and analyze security events using SIEM tools like Elastic ELK (Kibana), ensuring timely incident resolution. Analyze security logs with respect to the logs source type such as Access logs, SSH logs, or Sign in logs. Also checking the Network connection (Flows) To/From the host. Conduct root cause analysis of security incidents and escalate them when necessary. Collaborate with global security teams to investigate threats, analyze IOCs (file hashes, IPs, domains), and implement appropriate countermeasures. Prepare detailed incident analysis reports and contribute to reducing false positives through tool fine-tuning. Deliver actionable insights to improve the organization's security posture through regular reporting and analysis.

Education

B.Tech in Electrical and Electronics Engineering

2012 - 2016 · India

Interested in this developer?

Profile Score Breakdown

📷 Photo 0/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 70/100

Profile Overview

Member sinceAug 2025

Skills (16)

Security Incident Response SOC Operations Incident detection Incident analysis Abnormal Security CrowdStrike Mimecast ProofPoint Netskope Splunk +6 more