About
Security Analyst with 3.6 years of experience in threat monitoring, incident triage, SIEM analysis, and security operations. Hands-on experience with Microsoft sentinel, IBM QRadar, Splunk, CrowdStrike alerts, and real-time alert investigation. Experienced in log analysis, threat detection, and incident response by investigating security alerts, correlating events, and escalating critical incidents to ensure timely remediation.
Skills & Expertise (43)
Work Experience
Security Analyst
Teleperformance
Sep 2022 - Present
Led SOC shift operations, acted as escalation point for L1 analysts, and performed RCA using SIEM/EDR tools. Prioritized alerts (P1–P4) as per SOPs, managed ticket queues, and ensured SLA compliance. Led shift handovers, customer escalation calls, and P1 stakeholder meetings. Conducted ticket audits, quality checks, and turnover logs. Trained & mentored L1/L2 SOC analysts. Point of contact to the Customer Calls and handling the escalation and explaining the incident with the ICD document and the Action Items to the Customer. Leading the incident calls scheduling the meeting taking the updates for the L1s and Supporting as mentors to the L1s. Creating the Dashboards in the SIEM/EDR and other ticketing tools to visualization the Security procedure. Creating the daily, weekly and monthly reports and pivoting the tables based on the business requirement. Handing the Customers/Client calls for any P1 and P2 incidents and taking responsibility until the incident closer than creating the ICD and SIR documents entire the incident action items.
Education
BCA - Sanjeev Degree College
2018 - 2021 · Afghanistan