Back to Developers
Sayali Rane

Sayali Rane

Information Security Analyst

Hyderabad, India 1+ yrs exp 88 · Excellent

About

SOC-focused Information Security Analyst with 2+ years of experience in 24×7 Security Operations Center (SOC) environments, specializing in SIEM monitoring, alert triage, and incident investigation. Hands-on experience with IBM QRadar and familiarity with Microsoft Sentinel, including KQL-based query analysis and detection rule tuning. SC-200 Certified with strong understanding of threat detection, log analysis, and MITRE ATT&CK–based analysis of adversary tactics, techniques, and procedures (TTPs). Experienced across the incident response lifecycle including detection, containment, remediation, and audit-ready documentation within structured enterprise environments.

Skills & Expertise (28)

IBM QRadar Advanced
8.1/10
2
Years Exp
KQL Query Writing Intermediate
6.8/10
1
Years Exp
Microsoft Sentinel Intermediate
6.5/10
1
Years Exp
SOAR Intermediate
6.3/10
1
Years Exp
SQL querying KQL query development Basic PowerShell SLA Compliance Incident Documentation SOC Monitoring Incident Investigation HTTPS HTTP DNS IP TCP PCAP Analysis Network Traffic Analysis Linux Log Analysis Windows Log Analysis Cyber Kill Chain False Positive Reduction Threat Intelligence Ioa analysis IOC MITRE ATT&CK Mapping Incident escalation Alert Triage

Work Experience

Graduate Analyst

SecurityHQ

Oct 2024 - Jan 2025

Monitored enterprise-wide security events in a 24x7 SOC environment using IBM QRadar SIEM. Performed alert triage, investigated suspicious activities, and escalated incidents for timely containment. Implemented and tuned SIEM correlation rules to detect threats and reduce false positives by 35%. Generated detailed incident reports and provided risk reduction and resilience improvement recommendations. Aided threat trend analysis using the MITRE ATT&CK framework to enhance detection coverage and threat mapping.

Cybersecurity Analyst

Bosch Global Software Technologies

Jan 2025 - Present

Monitored application and system logs to identify anomalies, suspicious activities, and potential security incidents, ensuring timely detection and response. Performed alert triage and initial investigation, validating alerts, escalating critical incidents, and following defined playbooks for effective response. Optimized alert handling by supporting automated workflows and fine-tuning detection logic, contributing to a reduction in false positives and improved operational efficiency. Managed end-to-end incident handling for low-to-medium severity cases, including analysis, documentation, and coordination with security and development teams for remediation.

Education

B.E. in Electronics and Telecommunication - K.K. Wagh Institute of Engineering Education and Research

2019 - 2023 · Afghanistan

Certifications

Microsoft Certified: Security Operations Analyst Associate (SC-200)

Microsoft · 2026

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 8/15
💰 Rate 0/5
🏆 Certs 5/5
Verified 5/5
Total Score 88/100

Profile Overview

Member sinceApr 2026