Back to Developers
sreenivasa reddy seethireddy

sreenivasa reddy seethireddy

SOC Analyst

Bangalore, India
80
Profile Score

About

SOC Analyst with 4+ years of experience in Security Operations Center (SOC) environments, specializing in SIEM monitoring, threat detection, incident response, and security investigations. Experienced in Azure Sentinel, Splunk, IBM QRadar, Microsoft Defender, and CrowdStrike for detecting and analyzing security incidents, including phishing, malware, brute force attacks, and account compromise. Skilled in log correlation, threat intelligence analysis, KQL query development, and MITRE ATT&CK–based investigation techniques. Passionate about proactive threat hunting and strengthening enterprise security posture.

Skills & Expertise (46)

SIEM tools Expert
9.0/10
4
Years Exp
Microsoft Azure Sentinel Advanced
8.5/10
4
Years Exp
Splunk Enterprise Security (ES) Advanced
8.3/10
4
Years Exp
IBM QRadar Advanced
8.3/10
4
Years Exp
Endpoint Detection & Response (EDR) Advanced
8.0/10
4
Years Exp
TCP/IP LINUX DNS DHCP VPN OSI Model IDS/IPS Firewall Logs Palo Alto Fortinet DDoS brute force Ransomware Detection Frameworks MITRE ATT&CK framework Cyber Kill Chain Ticketing & ITSM ServiceNow Operating systems Windows Server VirusTotal Microsoft Defender for Endpoint Microsoft 365 Defender CrowdStrike Falcon Email Security ProofPoint Mimecast Vulnerability Management Qualys Nessus Threat Intelligence & IOC Analysis Networking & Security Concepts AbuseIPDB URLScan MXToolbox Identity & Cloud Security Azure AD Authentication Log Monitoring Impossible Travel Detection Risky Sign-in Investigation MFA Monitoring

Work Experience

SOC Analyst

Tata Consultancy Services (TCS)

Mar 2022 - Present

Performed real-time monitoring of security events using Azure Sentinel, Splunk, and IBM QRadar in a 24x7 SOC environment. Investigated 100+ security alerts weekly, including brute force attacks, phishing, and malware incidents. Developed and modified KQL queries for log analysis, threat detection, and threat hunting. Reduced SIEM alert false positives by tuning correlation rules and thresholds, improving SOC investigation efficiency. Correlated logs from firewall, endpoint, proxy, and identity sources to identify potential security incidents. Monitored endpoint security alerts using Microsoft Defender and CrowdStrike, performing malware triage and basic digital forensic analysis. Investigated phishing, spam, spoofing, and malicious attachment incidents using Proofpoint and Mimecast. Analyzed email headers to identify SPF, DKIM, and DMARC authentication failures and blocked malicious senders. Conducted threat intelligence investigations for IP addresses, domains, URLs, and file hashes using VirusTotal, AbuseIPDB, URLScan, and MXToolbox. Monitored Azure AD logs for risky sign-ins, MFA failures, impossible travel alerts, and privileged account activities. Scheduled and reviewed vulnerability scans using Qualys and Nessus, coordinating remediation activities through ServiceNow. Managed the full incident response lifecycle, including identification, containment, eradication, recovery, and reporting. Prepared SOC operational reports and ensured incident response within defined SLA timelines.

Education

Bachelor of Technology - JNTU College of Engineering, Kakinada

2017 - 2021 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation

Skills (46)

SIEM tools Microsoft Azure Sentinel Splunk Enterprise Security (ES) IBM QRadar Endpoint Detection & Response (EDR) TCP/IP LINUX DNS DHCP VPN +36 more