Back to Developers
Sameer Kapse

Sameer Kapse

SOC Analyst (L1)

Pune, Maharashtra 1+ yrs exp 88 · Excellent

About

B.E. IT graduate with CEH certification and hands-on SOC Analyst (L1) experience in SIEM monitoring, alert triage, and incident response using Microsoft Sentinel and Splunk. Skilled in analyzing Windows/Linux logs, network traffic, and EDR alerts to detect and respond to security incidents. Strong understanding of MITRE ATT&CK, IOC analysis, and incident lifecycle (NIST). Experienced in reducing false positives and escalating critical incidents in a 24×7 SOC environment. Actively seeking SOC L1 opportunities.

Skills & Expertise (56)

Microsoft Sentinel Advanced
8.5/10
2
Years Exp
Splunk Advanced
8.5/10
2
Years Exp
Alert Triage Advanced
8.2/10
2
Years Exp
Incident Classification Advanced
8.0/10
2
Years Exp
Incident Response Lifecycle Advanced
8.0/10
2
Years Exp
Threat Detection CrowdStrike TCP IP LINUX EDR DNS HTTP HTTPS OSI Model WIRESHARK Tcpdump IDS Ips concepts Firewall rule analysis Email Header Analysis Phishing triage SPF DKIM NIST CSF CVE Python Bash PowerShell Windows Threat Intelligence escalation False Positive Reduction SOAR Playbook Automation Incident Ticketing Documentation IBM QRadar log correlation Alert Investigation Dashboard Monitoring IOC Analysis IOC Enrichment Microsoft Defender for Endpoint MITRE ATT&CK Mapping Cyber Kill Chain VirusTotal AbuseIPDB AlienVault OTX Threat Hunting Windows Event Logs Linux logs Firewall Logs proxy logs Endpoint logs server logs

Work Experience

SOC Analyst (L1)

Ultranoyc

Nov 2024 - Present

Monitored SIEM dashboards (Microsoft Sentinel, Splunk) for real-time alerts in a 24×7 SOC environment. Performed alert triage, reducing false positives by ~20% through validation and correlation. Investigated security incidents using Windows, Linux, firewall, and endpoint logs. Analyzed EDR alerts (Microsoft Defender) to identify suspicious endpoint activity. Conducted IOC enrichment using VirusTotal, AbuseIPDB, and OTX. Escalated high-severity incidents following incident response lifecycle (NIST). Mapped incidents to MITRE ATT&CK techniques for threat classification. Documented incidents in ticketing systems with detailed analysis and remediation steps.

Education

Bachelor of Engineering (Information Technology) - International Institute of Information Technology, Pune

2021 - 2024 · Afghanistan

Certifications

Computer Hacking Forensic Investigator (CHFI)

Seven Mentor · 2026

Certified Ethical Hacker (CEH)

EC-Council · 2025

Security Operation Center (SOC)

Seven Mentor · 2025

Web Application Penetration Testing (WAPT)

Seven Mentor · 2025

Cisco Certified Network Associate (CCNA)

Cisco · 2024

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 8/15
💰 Rate 0/5
🏆 Certs 5/5
Verified 5/5
Total Score 88/100

Profile Overview

Member sinceMay 2026