Back to Developers
Sharath Sharu

Sharath Sharu

Security Analyst

Bengaluru, India
80
Profile Score

About

Results-driven Security Analyst with 3.5+ years of experience in Threat Investigation, Incident Response, SOC Operations, and Log Analysis. Proven expertise in detecting, analysing, and mitigating cyber threats using SIEM, EDR, and Sandbox technologies. Strong background in phishing analysis, malware investigation, vulnerability management, and ServiceNow-based incident lifecycle management. Adept at maintaining SLAs, and ensuring regulatory compliance.

Skills & Expertise (38)

SIEM Advanced
8.5/10
3.5
Years Exp
threat investigation Advanced
8.3/10
3.5
Years Exp
Incident Response Advanced
8.1/10
3.5
Years Exp
SOC Operations Advanced
8.0/10
3.5
Years Exp
Log Analysis Advanced
7.9/10
3.5
Years Exp
Log Analysis Advanced
7.9/10
3.5
Years Exp
Cyber kill chain framework Selenium Incident Response Lifecycle Splunk Securonix Microsoft Defender ProofPoint ANY.RUN Nexpose Azure Firewall Threat Intelligence VirusTotal AbuseIPDB MXToolbox Jira Git MITRE ATT&CK framework Threat Analysis SOC Reporting False Positive Analysis Threat Intelligence Investigation Phishing Investigation Endpoint security monitoring Event correlation Alerts Investigation Security monitoring ServiceNow Vulnerability Management Malware Investigation Phishing Analysis Sandbox technologies EDR

Work Experience

Security Analyst

Qualitest India Pvt Ltd

Jul 2022 - Present

Monitor and investigate security alerts from IDS, IPS, firewall, and SIEM tools to detect suspicious activities and potential security incidents. Analyze security logs from network devices and endpoint systems to identify successful and unsuccessful intrusion attempts and determine impact. Validate security alerts, create incident tickets in ServiceNow, and escalate confirmed incidents according to SOC incident response procedures. Monitor antivirus and EDR alerts on endpoint systems ensuring threat containment and remediation. Analyze suspicious emails and attachments using email header analysis and email gateway tools to identify phishing campaigns. Investigate suspicious IP addresses, URLs, domains, and file hashes using OSINT tools including VirusTotal, AbuseIPDB, MXToolbox, and URLVoid. Identify false positives in security alerts and collaborate with internal teams to improve detection rules. Prepare daily SOC reports and shift handover documentation to maintain structured SOC operations. Investigate security alerts and correlate indicators with MITRE ATT&CK techniques during threat analysis.

Education

Bachelor of Engineering (BE) - East West Institute of Technology

- 2020 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation

Skills (38)

SIEM threat investigation Incident Response SOC Operations Log Analysis Log Analysis Cyber kill chain framework Selenium Incident Response Lifecycle Splunk +28 more