About
• Approx 3 years of experience in Information Security and worked as Sr Security Analyst (Security Operations Centre team) • Hands on experience on Threat analysis, Remediations of malware and Security monitoring and Operation. • Experience on SIEM (Security Information and Event Management) tools like Monitoring real-time events using Splunk tool, ArcSight & Darktrace (Advanced Threat Hunting Tool) . • Preparing daily, weekly, and monthly reports as per client requirement. • Investigating and creating case for the security threats and forwards it to Onsite SOC team for further investigation and action. • Experience on performing log analysis and analyzing the crucial alerts at immediate basis. • Experience in Creating reports, alerts and dashboards in Splunk tool. • Good knowledge on networking concepts including OSI layers, TCP/IP, Ports, DNS, DHCP etc. • Hands on experience with Splunk SIEM tool for logs monitoring and analysis. • Trainings: Cyber Shiksha, SIEM (Splunk Tool), Incident Life cycle, Splunk Core User. • Tools: Splunk SIEM (Security Information and Event Management), ArcSight , DarkTrace and Tenable.
Skills & Expertise (3)
Work Experience
Sr. Security Analyst
Capgemini
Aug-2021 - Aug-2023
• Served as Security Analyst in SOC operations for real-time monitoring, analysing logs from various security/Industrial appliances by using Splunk console, troubleshooting of logging issues. • Administrating various incidents/security alerts triggered in SIEM tool. • Monitoring 24x7 for Security Alerts and targeted phishing sites by using SIEM tool with the help of technologies such as Watermark, Abuse mailbox and similar sounding domains.
Certifications
Splunk Core user
Splunk · 2023
Splunk Core user Certificate, it's about SIEM
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Depends on Offer