About
SOC L1 Analyst with 3+ years of hands-on experience in Microsoft Sentinel, Microsoft Defender, and security incident monitoring, seeking an opportunity to enhance cybersecurity operations through effective threat detection and incident handling
Skills & Expertise (17)
Work Experience
Security Operations Center (SOC) Analyst
Tata Consultancy Services
Feb 2022 - Present
Monitored and analyzed security alerts using Microsoft Sentinel SIEM platform. Investigated high and medium severity alerts and performed initial triage activities. Identified suspicious activities through log correlation and alert validation. Utilized Microsoft Defender (EDR) to monitor endpoint alerts and detect potential threats. Analyzed endpoint behaviors and supported incident containment actions. Performed phishing email analysis to identify malicious links and attachments. Monitored email security alerts using Cisco IronPort to detect phishing campaigns and spam threats. Used Cisco Umbrella to monitor web traffic and block access to malicious domains. Prevented users from accessing harmful or suspicious websites. Monitored Imperva WAF alerts to detect abnormal web application traffic. Assisted in identifying potential web-based attacks. Analyzed security logs from multiple sources to identify anomalies. Followed incident response procedures and ensured timely investigation. Escalated confirmed incidents to L2 teams as per SOC escalation matrix. Documented investigation findings and maintained incident records. Worked in a 24×7 SOC environment handling daily alert queues. Participated in shift handovers ensuring continuous monitoring coverage.
Education
Bachelor of Science - A.S.N Degree College
- · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Relocation
Open to Relocation