About
SOC Analyst (L2) with 3+ years of experience in security monitoring, incident response, and threat detection. Strong hands-on expertise in Splunk SIEM, CrowdStrike EDR, Palo Alto Firewalls, Zscaler, and email security tools. Experienced in alert triage, log correlation, MITRE ATT&CK mapping, and threat hunting, with a proven ability to handle high-severity incidents within SLA.
Skills & Expertise (23)
Work Experience
SOC Analyst (L2)
Brillioz Infotech Pvt. Ltd.
Nov 2022 - Present
Monitored and triaged high-volume security alerts from Splunk SIEM, CrowdStrike EDR, IDS/IPS, and email security platforms in a 24×7 SOC environment. Investigated phishing, malware, insider threats, brute-force attacks, and lateral movement (25–30 incidents/month) using Windows Event Logs, Sysmon, and EDR telemetry. Created and tuned SIEM correlation rules and dashboards, reducing false positives by 30–35% and improving real-time threat visibility. Acted as a primary incident responder for high and critical incidents, performing host isolation, credential resets, IOC blocking, and access revocation, meeting SLA in 95% of cases. Correlated logs across Palo Alto Firewalls, Imperva WAF, Zscaler Web Proxy, VPN, DNS, and Cloud (AWS/Azure) environments, supporting end-to-end incident investigations. Performed proactive threat hunting aligned with MITRE ATT&CK techniques and threat intelligence feeds.
Education
Bachelor of Engineering – Information Technology - Sinhgad College of Engineering
2017 - 2021 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation