Back to Developers
RUSHIKESH CHAVAN

RUSHIKESH CHAVAN

SOC Analyst (L1)

Pune, Maharashtra, India
80
Profile Score

About

SOC Analyst (L1) with 2.5 years of experience in 24x7 SOC environments, specializing in QRadar, Splunk SIEM, CrowdStrike EDR, Forcepoint DLP, ServiceNow, alert triage, incident response, phishing, malware, brute-force, network & endpoint security, MITRE ATT&CK, incident lifecycle, and false-positive reduction.

Skills & Expertise (21)

SIEM Monitoring & Log Correlation Intermediate
8.2/10
2.5
Years Exp
Incident Response & Alert Triage Intermediate
8.0/10
2.5
Years Exp
Security Operations Center (SOC) monitoring Intermediate
8.0/10
2.5
Years Exp
Splunk Intermediate
8.0/10
2.5
Years Exp
IOC Analysis Intermediate
7.8/10
2.5
Years Exp
Phishing Email Analysis & Email Security Intermediate
7.8/10
2.5
Years Exp
Endpoint Detection & Response Intermediate
7.8/10
2.5
Years Exp
CrowdStrike Falcon Intermediate
7.8/10
2.5
Years Exp
Malware Analysis & Suspicious File Investigation Intermediate
7.6/10
2.5
Years Exp
Network Security Intermediate
7.6/10
2.5
Years Exp
False Positive Reduction & Alert Tuning Intermediate
7.6/10
2.5
Years Exp
Root Cause Analysis & Escalation Handling Intermediate
7.4/10
2.5
Years Exp
ServiceNow Intermediate
7.4/10
2.5
Years Exp
MITRE ATT&CK framework Intermediate
7.2/10
2.5
Years Exp
Firewall Intermediate
7.2/10
2.5
Years Exp
IDS Intermediate
7.0/10
2.5
Years Exp
IPS Intermediate
7.0/10
2.5
Years Exp
Windows Intermediate
7.0/10
2.5
Years Exp
Forcepoint Intermediate
6.8/10
2.5
Years Exp
QRadar Intermediate
6.8/10
2.5
Years Exp
Proxy Intermediate
6.8/10
2.5
Years Exp

Work Experience

SOC Analyst (L1)

Capgemini

Sep 2023 - Present

Actively monitoring and analyzing security alerts in a 24x7 SOC environment using Splunk SIEM. Investigating security incidents across multiple log sources, including firewall, proxy, IDS/IPS, EDR, and system logs. Performing alert triage, prioritization, and classification based on severity (P1–P4) and business impact. Conducting in-depth phishing email analysis including header analysis, URL reputation checks, and attachment inspection. Investigating endpoint security alerts generated by CrowdStrike EDR and performing containment and remediation actions. Performing malware analysis using hash reputation, behavioral indicators, and sandboxing techniques. Correlating events across multiple security tools to identify attack patterns and potential threats. Reducing false positives by tuning alerts and improving Splunk use cases. Managing incidents using ServiceNow, ensuring accurate documentation, escalation, and timely closure within SLA. Preparing daily SOC health check reports, incident summaries, and client-specific security reports. Collaborating with SOC team members and senior analysts during high-severity incidents. Following SOC procedures, incident response playbooks, and internal security policies.

Education

Master of Science - Shivaji University, Kolhapur

- · Afghanistan

Bachelor of Science - Shivaji University, Kolhapur

- · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Skills (21)

SIEM Monitoring & Log Correlation Incident Response & Alert Triage Security Operations Center (SOC) monitoring Splunk IOC Analysis Phishing Email Analysis & Email Security Endpoint Detection & Response CrowdStrike Falcon Malware Analysis & Suspicious File Investigation Network Security +11 more