Back to Developers
Sahana Golkonda

Sahana Golkonda

Security Analyst

Bengaluru, KA
79
Profile Score

About

Around 4+ Years of hands-on Experience in Security Operations. Incident Response, Endpoint Security, Phishing analysis, Threat Intelligence, Network Security. Good understanding of log formats of various devices such as Web sense, Vulnerability Management Products, IDS/IPS, EDR, Firewalls, WAF, Proxy, Routers, Switches, OS, DB Servers, and Antivirus. Experience in Information Security with emphasis on security operations, Log monitoring, Log management, incident management, and security event analysis through Sentinel & Splunk SIEMs.

Skills & Expertise (14)

SIEM: Splunk, Qradar, MS Sentinel Advanced
8.4/10
4
Years Exp
Cloud: Azure, defender for Cloud Advanced
8.2/10
4
Years Exp
EDR/XDR: Crowdstrike, Defender, Checkpoint Advanced
8.0/10
4
Years Exp
Vulnerability Assessment: Qualysgaurd, Nessus Advanced
7.8/10
4
Years Exp
Query Language (KQL) Advanced
7.8/10
4
Years Exp
Email Gateway: Microsoft o365 Advanced
7.7/10
4
Years Exp
Malware Analysis: Joe Sandbox, Any.run, Browserling Advanced
7.5/10
4
Years Exp
IDS/IPS: Cisco Firepower, PaloAlto Advanced
7.5/10
4
Years Exp
Packet Analyzer: Wireshark, TCPDump Advanced
7.5/10
4
Years Exp
SOAR: Forti Soar Advanced
7.5/10
4
Years Exp
Phishing Campaign: KnowBe4 Advanced
7.2/10
4
Years Exp
ITSM: Service Now, Jira, Fortisoar Intermediate
7.0/10
4
Years Exp
Data loss prevention: Symantec DLP Advanced
7.0/10
4
Years Exp
OSINT Tools: MxToolbox, Abuse IPDB, VT, URL Void, Any Run, Cyber Chef, Sysinternals, PE studio, Browserling Intermediate
7.0/10
4
Years Exp

Work Experience

Security Analyst

Toyota Kirloskar Motor Pvt Limited

Jun 2024 - Aug 2025

Working in Security Operation Centre (24/7), monitoring of SOC events, Detecting and Preventing the Intrusion attempts. Real time monitoring of Network Security devices such IPS, Firewall, DLP, Endpoint Security, Operating system, and Email security, servers, VPN etc. Performing the in-depth analysis to identify root cause of the incidents and performing malware analysis to identify behavior of the files. Analyzing the phishing emails which are reported by the employees to the SOC team and identifying whether the reported email is a phishing or spam or legitimate. Performing the phishing campaign and educating the employees. Creating of Reports in QRADAR & Sentinel. Performing the vulnerability assessment and coordinating with patching team and Business units to to remediate the vulnerabilities. Using AV and other analysis tools to perform Malware Analysis and suggesting completing removal of malware from client's environment. Performing daily health checkup of the SIEM solution to make sure all the log sources are reporting the logs into the SIEM platform. Differentiate the false positives from true intrusion attempts and help remediate / prevent. Support escalation and work closely with Business units as required. Provide tuning and filtering recommendations to engineering teams. Supported requests for data by the Business units and other teams analyzing daily, weekly and monthly reports. Taking the appropriate action based on advisories IOCs, identifying threat actor using Mitre ATTACK, etc and coordinating with respective team to block the IOCs.

Executive

Micro Labs Private Limited

Jan 2021 - May 2024

Working in Security Operation Centre (24/7), monitoring of SOC events, Detecting and Preventing the Intrusion attempts. Worked for MNC clients, interacting directly with the customers, presenting SOC status reports and completing the action items according to client request. Analyzing the phishing emails which are reported by the employees to the SOC team and identifying whether the reported email is a phishing or spam or legitimate. Performing the phishing campaign and educating the employees. I have a strong understanding of analyzing the cloud logs which comes from Cloud trial, VPC flows logs. Performing the vulnerability assessment and coordinating with patching team to remediate the vulnerabilities. Support escalation and work closely with stakeholders as required. Support requests for data by the customer and other teams analyzing daily, weekly and monthly reports. Analyze and investigate the alerts in SOC monitoring tool to report any abnormal behaviors, suspicious activities, traffic anomalies etc. Differentiate false positives from true intrusion attempts and help remediate/prevent cyber-attacks.

Education

MBA - JSS Center of Management Studies

- 2017 · Afghanistan

Bachelor of Commerce - BS Channabassapa First Grade College

- · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 19/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 79/100

Profile Overview

Member sinceFeb 2026

Availability Details

Visa Status

CPT

Relocation

Open to Relocation

Skills (14)

SIEM: Splunk, Qradar, MS Sentinel Cloud: Azure, defender for Cloud EDR/XDR: Crowdstrike, Defender, Checkpoint Vulnerability Assessment: Qualysgaurd, Nessus Query Language (KQL) Email Gateway: Microsoft o365 Malware Analysis: Joe Sandbox, Any.run, Browserling IDS/IPS: Cisco Firepower, PaloAlto Packet Analyzer: Wireshark, TCPDump SOAR: Forti Soar +4 more