About
SOC Analyst with 11 months of hands-on experience in Security Operations, SIEM monitoring, incident triage, threat detection, and incident response using Wazuh and Sophos security technologies. Experienced in security event analysis, MITRE ATT&CK mapping, firewall investigations, root cause analysis, and security playbook-driven response. Skilled in log correlation, authentication attack detection, ticketing workflows, and SOC process improvement.
Skills & Expertise (19)
Work Experience
Cyber Security Analyst
Fluidech
Jun 2025 - Present
Monitored and analyzed security alerts using Wazuh SIEM. Investigated suspicious authentication attempts and endpoint activities. Performed alert triage and escalated incidents according to SOP. Conducted root cause analysis (RCA) for detected security incidents. Analyzed Windows event logs, SSH logs, and firewall logs to identify attack patterns. Tuned SIEM rules to reduce false positives and improve detection efficiency. Documented incidents and remediation steps for internal reporting. Created lightweight custom SIEM rules for SSH brute force, C2 connections, suspicious process activity, and malicious IP detections. Supported ticketing and event management for escalated security incidents. Assisted in SOP and detection playbook improvements. Performed deep analytical review of triggered security events. Mapped detections to MITRE ATT&CK techniques for threat classification.
Education
No education history added yet
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation
Skills (19)
Click a skill to find developers with the same skill