Back to Developers
Saikumar joshi

Saikumar joshi

SOC Analyst

80
Profile Score

About

Security Operations Analyst with 2 years of experience in 24×7 SOC environments specializing in security monitoring, threat detection, and incident investigation. Skilled in analyzing security alerts using SIEM platforms (Splunk, IBM QRadar, Microsoft Sentinel) and EDR tools (CrowdStrike Falcon, Microsoft Defender). Experienced in log analysis across firewall, proxy, endpoint, and email systems, with strong capability in phishing investigations, incident escalation, and SOC playbook-driven response.

Skills & Expertise (43)

Splunk Intermediate
7.8/10
2
Years Exp
IBM QRadar Intermediate
7.8/10
2
Years Exp
Microsoft Sentinel Intermediate
7.8/10
2
Years Exp
LogRhythm Intermediate
7.8/10
2
Years Exp
CrowdStrike Falcon Intermediate
7.8/10
2
Years Exp
Microsoft Defender for Endpoint Intermediate
7.8/10
2
Years Exp
Security monitoring Intermediate
7.3/10
2
Years Exp
AWS CloudTrail logs analysis Intermediate
7.3/10
2
Years Exp
Alert Triage Intermediate
7.0/10
2
Years Exp
Incident analysis Intermediate
7.0/10
2
Years Exp
ServiceNow Qualys VMDR McAfee ATD Hybrid Analysis Anyrun WIRESHARK Nessus scanning Incident Response Lifecycle OSticket Documentation SLA handling MITRE ATT&CK Cyber Kill Chain NIST Cybersecurity Framework ISO 27001 SOC 2 Anomali False-positive reduction log correlation Use-case tuning Endpoint Investigation Containment Cloud Security Monitoring IAM activity review Recorded Future URL investigation IOC ingestion SOAR-based enrichment workflows Palo Alto Firewall VPN Zscaler Proxy Imperva WAF Phishing Analysis

Work Experience

SOC Analyst

RAYGAIN TECHNOLOGIES PRIVATE LIMITED

Feb 2024 - Present

Monitor SIEM dashboards and perform initial triage of security alerts. Analyze basic log sources (Firewall, Proxy, Endpoint, Email, IPS/IDS) to identify suspicious or abnormal activities. Validate alerts and categorize them as False Positive or potential security incidents. Investigate phishing emails, review headers/body/links, and provide recommendations to users. Escalate confirmed incidents to L2 teams with complete evidence, logs, and timeline details. Track and manage incidents in ticketing tools (ServiceNow / OS Ticket) and maintain clear investigation notes. Monitor the health of security tools, log sources, and sensors, and raise tickets for any SIEM ingestion or connectivity issues. Follow SOC playbooks for alert handling, escalation, documentation, and reporting. Perform continuous monitoring to ensure timely detection of threats and maintain strong situational awareness. Support overall SOC operations by coordinating with internal teams, ensuring smooth workflows, and improving alert-handling efficiency.

Education

Bachelor of Science (B.Sc.) – Cyber Security

- · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Availability Details

Relocation

Open to Relocation