Back to Developers
Syed Siraj

Syed Siraj

SOC Analyst

Mumbai, India
68
Profile Score

About

SOC Analyst with 2 years of hands-on experience in 24x7 Security Operations, specializing in SIEM monitoring, endpoint threat detection, and cloud security operations. Proven expertise in Splunk and LogRhythm for real-time log analysis, alert correlation, and incident investigation. Strong background in CrowdStrike EDR for endpoint detection, containment, and remediation of advanced threats. Experienced in vulnerability management using Qualys, including CVE analysis, risk prioritization, and remediation tracking. Skilled in IDS/IPS monitoring, network traffic analysis, and threat identification. Hands-on experience with AWS cloud security services including CloudTrail, GuardDuty, and IAM monitoring. Adept at incident response, threat hunting, and security event escalation aligned with SOC best practices.

Skills & Expertise (9)

Splunk Intermediate
7.1/10
2
Years Exp
5
Proficiency
5
Experience
10
Recency
8
Demand
AWS CloudTrail Intermediate
7.1/10
2
Years Exp
5
Proficiency
5
Experience
10
Recency
8
Demand
GuardDuty Intermediate
7.1/10
2
Years Exp
5
Proficiency
5
Experience
10
Recency
8
Demand
IAM Intermediate
7.1/10
2
Years Exp
5
Proficiency
5
Experience
10
Recency
8
Demand
CrowdStrike Falcon Intermediate
7.0/10
2
Years Exp
5
Proficiency
5
Experience
10
Recency
8
Demand
LogRhythm Intermediate
6.8/10
2
Years Exp
5
Proficiency
5
Experience
10
Recency
6
Demand
Qualys Intermediate
6.8/10
2
Years Exp
5
Proficiency
5
Experience
10
Recency
6
Demand
Incident Management Intermediate
6.8/10
2
Years Exp
5
Proficiency
5
Experience
10
Recency
6
Demand
Threat Intelligence Intermediate
6.8/10
2
Years Exp
5
Proficiency
5
Experience
10
Recency
6
Demand

Work Experience

SOC Analyst

TCS

03-2024 - Present

Monitored and analyzed security events using Splunk and LogRhythm SIEM to detect suspicious activities and potential threats. Created, tuned, and optimized SIEM correlation rules to reduce false positives and improve alert fidelity. Performed real-time alert triage, investigation, and escalation following SOC runbooks and SLAs. Conducted endpoint threat analysis using CrowdStrike Falcon, including malware detection and host containment. Investigated phishing emails, malicious URLs, and file hashes using threat intelligence platforms. Executed Qualys vulnerability scans, analyzed findings, and prioritized risks based on CVSS scores. Coordinated with IT teams for vulnerability remediation and validation. Monitored IDS/IPS alerts to identify network-based attacks and anomalous traffic patterns. Analyzed AWS security logs from CloudTrail, GuardDuty, and VPC Flow Logs for cloud threats. Investigated IAM anomalies, unauthorized access attempts, and misconfigurations in AWS environments. Performed incident response activities including containment, eradication, and recovery support. Conducted proactive threat hunting using SIEM queries and endpoint telemetry. Documented incidents with detailed root cause analysis and mitigation recommendations. Supported SOC compliance reporting and security metrics generation. Collaborated with L2/L3 teams for advanced investigations and post-incident reviews. Collate security incident and event data to produce monthly exception and management reports.

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 14/20
🎓 Education 0/10
⏱️ Experience 9/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 68/100

Profile Overview

Member sinceJan 2026

Availability Details

Current Company

Tata Consultancy Services

Visa Status

No Visa

Relocation

Open to Relocation

Skills (9)

Splunk AWS CloudTrail GuardDuty IAM CrowdStrike Falcon LogRhythm Qualys Incident Management Threat Intelligence