About
You can use this polished **About Me / Professional Summary** section for job applications: Cyber Security Analyst and SOC Analyst with 3+ years of experience in 24x7 Security Operations Center (SOC) environments. Skilled in SIEM monitoring, security event analysis, alert triage, incident investigation, and incident response across endpoint, email, and network security domains. Experienced in handling high-volume security alerts while performing severity classification, IOC analysis, threat detection, and SLA-driven incident management. Strong understanding of the Incident Response Lifecycle, MITRE ATT&CK framework, and Cyber Kill Chain methodologies, with proven ability to identify malicious activities, reduce false positives, escalate critical threats, and maintain accurate incident documentation. Passionate about strengthening organizational security posture through proactive monitoring, analytical problem-solving, and continuous learning in cybersecurity operations.
Skills & Expertise (39)
Work Experience
SOC Analyst
TCS
Apr 2025 - Present
Monitor and analyze correlated security events in SIEM to detect advanced threats across endpoint, network, and cloud environments. Perform root cause analysis (RCA) for high and critical security incidents, identifying attack vectors and impacted assets. Investigate compromised accounts, brute-force attempts, suspicious PowerShell activity, and abnormal authentication patterns. Supported SIEM use case tuning and alert optimization to improve detection accuracy. Conduct endpoint forensic triage using EDR telemetry to identify persistence mechanisms and malicious processes. Analyze malicious files and URLs using sandboxing and threat intelligence platforms to determine impact and risk level. Validate and enrich alerts using IOC feeds (hash, IP, domain reputation) before escalation or containment. Participate in incident bridge calls with stakeholders during critical incidents to provide real-time technical updates. Ensure adherence to SLA metrics and maintain quality incident documentation for audit and compliance requirements.
SOC Analyst
Wipro Limited
Dec 2022 - Apr 2025
Performed 24x7 SIEM monitoring, analyzing 25–40 security alerts per day across endpoint, email, and network environments. Conducted alert triage and validation, reducing false-positive alerts by 20% through contextual and log-based analysis. Executed indicator of compromise (IOC) identification and correlation using SIEM logs, email artifacts, and endpoint telemetry. Classified incidents based on severity (Low / Medium / High) and ensured timely escalation of medium to critical incidents to L2/L3 teams. Supported the full incident response lifecycle, including containment, eradication, recovery, and remediation coordination. Mapped security incidents to MITRE ATT&CK tactics and Cyber Kill Chain stages to improve threat classification and analysis.
Education
Bachelor of Technology (B.Tech) in Computer Science and Engineering - Dr. Babasaheb Ambedkar Technological University
- 2022 · Afghanistan
Certifications
Azure Administrator Associate
Microsoft
Foundations of Cybersecurity
Alert triage, incident investigation, escalation, and reporting
Wipro
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Relocation
Open to Relocation
Skills (39)
Click a skill to find developers with the same skill