Back to Developers
Satheesh Pinnaboina

Satheesh Pinnaboina

Cyber Security Analyst

80
Profile Score

About

Cybersecurity Analyst with 2.7+ years of experience in a 24x7 Security Operations Center (SOC) environment, specializing in SIEM monitoring, alert triage, incident response, threat detection, and vulnerability management. Hands-on expertise in IBM QRadar SIEM, Splunk, Tenable Nessus, and FortiGate security solutions. Experienced in log correlation, IOC analysis, MITRE ATT&CK mapping, CVE/CVSS risk scoring, and end-to-end incident lifecycle management while maintaining SLA compliance. Strong knowledge of network security monitoring, firewall log analysis, phishing investigation, and security framework alignment (NIST, ISO 27001).

Skills & Expertise (24)

IBM QRadar Advanced
8.3/10
3
Years Exp
Tenable Nessus Advanced
8.1/10
3
Years Exp
log correlation Advanced
8.0/10
3
Years Exp
CVE analysis Advanced
8.0/10
3
Years Exp
CVSS scoring Advanced
8.0/10
3
Years Exp
EDR Advanced
8.0/10
3
Years Exp
IDS/IPS Advanced
8.0/10
3
Years Exp
AQL Queries Advanced
7.8/10
3
Years Exp
Splunk Intermediate
7.5/10
3
Years Exp
Fortigate Firewall Intermediate
7.5/10
3
Years Exp
Nmap WIRESHARK PhishTank MXToolbox CISCO Talos URLScan ANY.RUN Hybrid Analysis VirusTotal Windows and Linux Servers SNOW Service Manager Micro Focus Fortify Audit Workbench Trend Micro

Work Experience

Associate Analyst

DCM INFOTECH Pvt Ltd.

Jul 2023 - Present

Performed 24x7 security monitoring and alert triage in a SOC environment using IBM QRadar SIEM, analyzing 50+ security alerts per shift across firewalls, IDS/IPS, proxy, DNS, AV, load balancers, Windows, and Linux servers. Conducted log correlation and event analysis to detect potential security breaches and suspicious network traffic using AQL queries. Managed end-to-end incident lifecycle management including detection, investigation, incident prioritization (P1/P2/P3), root cause analysis (RCA), containment, eradication, recovery, and documentation while ensuring SLA compliance. Investigated phishing emails and malicious attachments using threat intelligence platforms and sandbox environments like ANY.RUN to identifying and blocking Indicators of Compromise (IOCs). Conducted malware, phishing, and network threat intelligence analysis using VirusTotal, Hybrid Analysis, URLScan, Cisco Talos, and MXToolbox, for IP/domain/hash/file reputation validation, leveraging Wireshark for packet inspection and Nmap for port scanning during incident investigations. Reduced false positives by 20% through SIEM filter optimization, correlation rule tuning, and log source validation, contributing to improved detection accuracy and reduced Mean Time to Respond (MTTR). Ensured SLA compliance by closing incidents within defined timelines and escalating high-severity (P1/P2) incidents as per escalation matrix. Conducted vulnerability assessments using Tenable Nessus, performing 30+ monthly and on-demand scans, analyzing CVEs, and prioritizing remediation based on CVSS scoring. Coordinated with Windows, Linux, and Network teams to support patch management and vulnerability remediation without business disruption. Performed SAST scans using Micro Focus Fortify Audit Workbench and delivered actionable remediation reports to development teams. Generated daily, weekly, and monthly SOC performance reports, supporting compliance and audit requirements aligned with security best practices and frameworks (NIST, ISO 27001).

Education

Graduation - Kakatiya University

- 2020 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Need Sponsorship

Relocation

Open to Relocation

Skills (24)

IBM QRadar Tenable Nessus log correlation CVE analysis CVSS scoring EDR IDS/IPS AQL Queries Splunk Fortigate Firewall +14 more