About
Security Analyst and Incident Coordinator with 2+ years of hands-on experience in 24x7 Security Operations (SOC). Skilled in SIEM monitoring, alert triage, incident severity classification, and coordinating incident response across L1/L2/L3 teams. Experienced with LogRhythm SIEM (on-prem and SaaS), EDR, and DLP tools to detect, validate, and respond to security incidents. Strong background in IOC investigation, scope and impact assessment, incident playbook execution, log analysis, and accurate documentation to support enterprise-level cyber defense operations.
Skills & Expertise (29)
Work Experience
Security Analyst
Adicis Infotech Private Limited
Feb 2026 - Present
Monitor and triage SIEM alerts in a 24x7 SOC environment; validate true positives and reduce false positives. Investigate incidents using logs from Firewall, IDS/IPS, Proxy, AD, EDR, and DLP; correlate events to assess impact. Perform IOC-based analysis and map incidents to MITRE ATT&CK techniques. Utilize and deploy EDR solutions for endpoint threat detection, response, and policy tuning. Monitor and manage DLP solutions, including policy creation and incident handling to prevent data leakage. Support incident response activities including identification, containment, escalation, and basic remediation. Conduct basic threat hunting using SIEM queries to detect anomalous behavior. Manage user access and security policies in Active Directory and Microsoft 365. Configure firewall rules and perform NAS access management for secure data handling. Manage Proxmox virtual machines, including provisioning, backup, and restore operations. Demonstrate basic knowledge of AWS (EC2, S3, IAM) and cloud security practices. Monitor log source health and coordinate with teams to resolve ingestion issues. Perform basic root cause analysis and maintain detailed incident documentation.
Analyst
eClerx Pvt. Ltd.
Mar 2024 - Present
Monitored and analyzed security events using LogRhythm SIEM. Performed alert triage, assigned severity based on defined criteria, and escalated confirmed incidents to L2 analysts with all relevant information. Investigated phishing, malware, brute-force attacks, and unauthorized access attempts. Conducted log analysis across endpoints, servers, firewalls, and network devices. Tuned SIEM alerts and reduced false positives to improve detection accuracy; monitored health and performance of security monitoring tools and reported anomalies. Performed threat hunting using IOCs and SIEM data; executed predefined use cases and scripts to gather additional information about alerts. Created and managed incident tickets with thorough documentation. Collaborated with L2/L3 teams for incident response and resolution. Generated daily and monthly SOC reports for management review.
Education
Bachelor of Engineering (B.E.) - Saraswati College of Engineering
- · Afghanistan
Cybersecurity & CEH - Boston Institute of Analytics
- · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Skills (29)
Click a skill to find developers with the same skill