Back to Developers
Sanga Chakrabarty

Sanga Chakrabarty

Cybersecurity Analyst

Howrah 2+ yrs exp 85 · Excellent

About

Cybersecurity Analyst with over 2 years of hands-on experience specializing in security operations, threat detection, and incident response within enterprise Security Operations Center (SOC). Proven expertise in monitoring and managing Microsoft Defender XDR and Microsoft Sentinel across hybrid and multi-cloud environments to deliver real-time threat triage and rapid incident remediation. Skilled in conducting proactive threat hunts using Kusto Query Language (KQL), automating incident response workflows with Azure Logic Apps, and analyzing diverse log sources for comprehensive threat visibility and forensic investigations. Strong foundation in MITRE ATT&CK framework, adversary TTP analysis, and endpoint/network forensics combined with experience in phishing investigations, and security alert triage to accelerate detection and containment.

Skills & Expertise (29)

Microsoft Sentinel Advanced
8.1/10
2
Years Exp
Incident Response Advanced
8.0/10
2
Years Exp
Threat Detection Advanced
8.0/10
2
Years Exp
Microsoft Defender for Endpoint Advanced
7.9/10
2
Years Exp
Kusto Query Language Advanced
7.5/10
2
Years Exp
Firewall Logs Threat Intelligence Endpoint Telemetry Azure AD Identity Protection Analytics rules Incident Documentation Runbooks Post-Incident Reports Governance Compliance Audits Security Information And Event Management Automation SIEM Engineering Threat Hunting MITRE ATT&CK BMC Helix ServiceNow ITSM Azure Logic Apps Entra ID protection Microsoft Defender for Identity Microsoft Defender for Cloud Apps Microsoft Defender for Office 365 endpoint detection and response

Work Experience

Security Analyst

Accenture

Nov 2023 - Present

Monitored and responded to real-time security alerts using Microsoft Sentinel and Microsoft Defender, enabling rapid threat detection, triage, and containment in hybrid environments. Led end-to-end incident response investigations for malware, phishing, and social engineering incidents through detailed log analysis, forensics, and EDR telemetry, ensuring timely remediation and meticulously documented outcomes. Designed and executed advanced threat hunting queries using Kusto Query Language (KQL) in Microsoft Sentinel, uncovering suspicious activity and reducing threat dwell time by actively identifying hidden adversary behaviors. Correlated events and logs from SIEM alerts, firewall logs, endpoint telemetry, and network events to detect and triage security incidents. Investigated Identity based threats leveraging Azure AD and Identity Protection. Architected and automated incident response workflows using Azure Logic Apps and Sentinel playbooks, decreasing manual efforts by and improving MTTR for security incidents. Fully automated DDoS triage using automation, reducing manual effort by 100%. Authored and optimized analytics rules and detection logic mapped to MITRE ATT&CK, boosting detection of adversary tactics and enhancing security visibility across the stack. Designed and delivered weekly and monthly security status reports and operational summaries for leadership and clients. Maintained accurate incident documentation, runbooks, and post-incident reports to support governance, compliance audits, and continuous improvement. Collaborated closely with IT, infrastructure, and security teams to drive improvements in threat detection, response workflows, and operational stability. Stayed up-to-date with emerging threats and threat intelligence to proactively adapt detection strategies and reinforce defense posture.

Education

Bachelor of Technology, ECE - Techno India University

2019 - 2023 · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 10/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 85/100

Profile Overview

Member sinceApr 2026