Back to Developers
Tejavath Shirisha

Tejavath Shirisha

SOC Analyst

Hyderabad
80
Profile Score

About

Dedicated and detail-oriented SOC Analyst with 4+ years of hands-on experience in security event monitoring, incident response, and threat detection in enterprise-level SOC environments. Seeking to leverage my expertise in SIEM tools, log analysis, and incident triage to contribute to a proactive cybersecurity team. Committed to continuous learning, risk mitigation, and strengthening the organization's security posture against evolving cyber threats. Where my experience, education and abilities would be an advantage for the growth of employer and myself.

Skills & Expertise (43)

Splunk Advanced
8.6/10
4
Years Exp
SIEM Advanced
8.5/10
4
Years Exp
endpoint detection and response Advanced
8.2/10
3
Years Exp
Firewall Monitoring Advanced
8.0/10
4
Years Exp
Documentation TCP IP ports DNS DHCP Content filtering Checkpoint Networking Concepts Incident Reports OWASP Top 10 Threat Modelling Cyber Attacks Dos DDoS MITM SQL Injection XSS CSRF ServiceNow Wazuh Azure Sentinel CrowdStrike Falcon Microsoft Defender ProofPoint Sophos MDR Qualys Guard Symantec DLP XSOAR palo alto Subnet Antivirus DLP Proxy Firewall Filtering IPS Email Security WAF Phishing attacks OSI Layers

Work Experience

Analyst

Experis IT Pvt Ltd

Sep 2021 - Mar 2024

Perform root-cause analysis of incident and working with eradication upon client approvals. Perform threat hunting to identify adversaries’ tactics and techniques and working with client hunting tasks on daily basis. Performed end-to-end incident management by monitoring, analyzing and reporting, breaches, attacks, malicious activities through raw logs, alerts and dashboards using Splunk ESM. Also performed advanced incident response and to provide enhanced malware detection by monitoring any phishing attempts through mailbox. Ensuring quality call handling and call escalation adhering to SLA. Responsible for incident management and change management process handling. New device integration and use case creation. Finding the Critical servers and application inventory from respective business owners and scheduling the scan weekly, monthly and Quarterly basis. Knowledge sharing session with the team members whenever complex incident issues are raised and also lessons learned from other team members.

SOC Analyst

Aadvi Tech Solutions

Jul 2025 - Present

Conduct daily collection and monitoring of sources from Deep, Dark web and OSINT. Lead hunting efforts based on intelligence requirements for dark web, fraud and phishing investigations. Produce advance vulnerability reports by analysing the published CVEs and how threat actors are exploiting the vulnerabilities. Identifying potentially malicious domains affecting the customers and reporting them to the web host using various domain look up tools. Providing Ad hoc event and crisis coverage on social sites as per customer Requirement. Monitor for PII, PHI, PFI, sensitive corporate data from illicit sources. Manually hunting for Fraudulent Job Posting, Marketplaces - Counterfeit Goods, Piracy - Media Integrity, Scams- Giveaway, and Scams - Money Flipping on social networks. Monitoring for inappropriate use of customer logo using various reverse image tools. Search social sites (specifically the Big 5 networks) for impersonations of Executives & Brands of Zero fox Customers and reporting them to the respective network using trademark given by the customers. Performed end-to-end incident management by monitoring, analysing and reporting, breaches, attacks, malicious activities through raw logs, alerts and dashboards using Splunk ESM. Also performed advanced incident response and to provide enhanced malware detection by monitoring any phishing attempts through mailbox. Ensuring quality call handling and call escalation adhering to SLA. Responsible for incident management and change management process handling. New device integration and use case creation.

Engineer

Genius Consultants Ltd

Aug 2024 - Jul 2025

Monitoring various incidents/security Alerts triggered in SIEM tool. Carrying out log monitoring and incident analysis for various devices such as Firewalls, IDS, IPS, database, web servers and so forth. Security event analysis and intrusion detection by review and analysis of events generated by various components including IDS/IPS, firewalls, Routers, DB,OS and various types of security devices. Performing Real-Time Monitoring, Investigation, Analysis, Reporting and Escalations of Security events from multiple log sources. Maintain a keen understanding of evolving internet threats to ensure the security of client networks. Contacting the customers directly in case of high priority incidents and helping the customer in the process of mitigating the attacks. Troubleshooting SIEM dashboard issues when there are no reports getting generated or no data available. Communicate with clients about collected information and verify their situation. Creating Reports and will share the documentation information with the client. Determine the scope of security incident and its potential impact to Client network recommend steps to handle the security incident with all information and supporting evidence of security events. Good understanding of OWASP Top 10, IDS, IPS, Threat modelling and Cyber Attacks like DOS, DDOS, MITM, SQL Injection, XSS and CSRF. Initial troubleshooting with respect to Log Source Communication issues. Creating Reports Alerts and investigating issues identified during monitoring the live traffic. Preparing RCA document and daily/weekly/monthly Reports. Handling multiple customers globally analyzing the customer networks for potential security attacks. Support security incident response processes in the event of a security breach by providing incident reporting. Performing Threat Hunts on daily basis with the Active IOC’s found on the various threat Intel sources in both console like SIEM & EDR and intimating to the clients with the report when any traces or findings are there. Preparing the weekly SOC reports, Bi-Monthly adhoc requests reports, monthly KPI reports, SLA reports, quarterly based reports and annual based reports sharing consistently to the clients. Working & sharing on the client ad-hoc requests regarding the active investigations, to pull the user logs and to investigate on the hosts via communication channels. Enabling & Disabling the Log Sources via Log Source Management in the QRadar based on the Decommission report from the clients.

Education

BE - Osmania University

- 2015 · Afghanistan

MPC - Sri CV Raman Jr College

- 2011 · Afghanistan

SSC - GRRM High School

- 2009 · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026