About
CSOC Threat Detection Engineer with expertise in Sentinel, Devo SIEM and Qradar, log parsing and ingestion, Linux, SQL and incident response automation.
Skills & Expertise (18)
Work Experience
Associate Consultant - Threat Detection Engineer
Capgemini
Sep 2022 - Present
Implemented and fine-tuned 500+ Log Analytics rules in Azure Sentinel, improving threat detection efficiency. Developed workspace functions for accurate parsing of device-specific logs from Syslog and CEF, ensuring seamless log ingestion and normalization. Designed and automated incident response playbooks using Azure Logic Apps, reducing manual intervention and accelerating response times. Optimized 1298 SIEM rules in Azure Sentinel, achieving a 50% reduction in weekly offense count (from 334 to 171) through enhanced correlation and rule tuning. Created and fine-tuned 168 SIEM rules across QRadar and Sentinel, strengthening detection capabilities for diverse security devices. Authored Standard Operating Procedures (SOPs) and developed automation playbooks for L1/L2 SOC teams, streamlining incident triage and response workflows.
SDE (Intern)
Capgemini - Cloud Infrastructure Security Services
Feb 2022 - Jul 2022
SIEM rules translation between Sentinel, and Qradar, Devo SIEM.
Education
Post-Graduation in Electrical Engineering - Delhi Technological University - DTU
2020 - 2022 · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Skills (18)
Click a skill to find developers with the same skill
Similar Profiles
Rahul K
Security Monitoring and Threat Detection Analyst
Indrajeet Deshmukh
SOC Analyst | Threat Detection | SIEM Tools Expertise
Chinmay Mendse
SOC Analyst | TryHackMe SAL-1 Certified | Blue Team | SIEM • Threat Detection • Incident Response | Ex-Software Developer
Harsh Patel
Threat Research Engineer