About
SOC Analyst with over 3 years of experience in Information Security, specializing in incident management, endpoint security, and log analysis using SIEM tools. Skilled in 24x7 SOC operations, offering continuous log monitoring, security information management, and threat detection. Experienced in investigating security incidents and implementing effective response strategies to enhance organizational security.
Skills & Expertise (16)
Work Experience
SOC Analyst
Wipro
Aug 2022 - Present
Working on SIEM tools like LogRhythm, Splunk and Qradar providing operations support at the Security Operations Centre for different member firms. Phishing and Spam Email Analysis in LogRhythm, O365 Defender. Exposure to Ticketing tool like Cherwell, Jira and ServiceNow. Monitored, analysed, and responded to infrastructure threats and vulnerabilities using LogRhythm, Splunk, and Azure Sentinel, providing proactive defenses and ensuring security compliance. Generate detailed reports on detected security events, false positives, and lessons learned from incident. Maintain accurate logs and documentation of incidents, including actions taken and their outcomes. Conducted comprehensive monitoring and analysis of network events, antivirus (AV) logs, Windows logs, and intrusion prevention system (IPS) logs to identify potential malware infections, login failures, and external threats, raising cases when incidents were detected based on defined thresholds. Monitored firewall and IPS activity to detect and mitigate external threats, contributing to a secure network environment through continuous security event assessments and response. Working on Real time network traffic by analysing the logs from IDS and Firewalls through SIEM Tool.
Education
B. Tech - Pragati Engineering College
- 2017 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Depends on Offer