Back to Developers
Subham Gayen

Subham Gayen

SOC Analyst

Hyderabad, India
84
Profile Score

About

SOC Analyst with 1.5 years of experience in Security Operations Center (SOC) environments, specializing in security monitoring, alert triage, and incident investigation. Hands-on experience with SIEM platforms including QRadar, Splunk, and Microsoft Sentinel, along with endpoint analysis using EDR tools. Skilled in log analysis, phishing and malware alert investigation, IOC validation, and escalating confirmed incidents in alignment with incident response playbooks and the MITRE ATT&CK framework.

Skills & Expertise (14)

Threat Detection and Hunting Intermediate
8.0/10
1.5
Years Exp
Alert Triage Incident Response IOC Analysis Phishing Investigation QRadar Splunk Microsoft Sentinel CrowdStrike Falcon Microsoft Defender for Endpoint ProofPoint Microsoft 365 Defender MITRE ATT&CK Malware Triage

Work Experience

SOC Analyst

SBL Technologies

Jun 2025 - Present

Monitor, triage, and investigate security alerts across Splunk and Microsoft Sentinel in on-prem and multi-cloud (Azure, AWS) environments to detect and respond to high-risk incidents. Perform endpoint and identity investigations using CrowdStrike Falcon, including host timeline analysis, privilege escalation detection, and Azure AD anomaly analysis, executing containment actions such as endpoint isolation and account lockouts. Develop and tune detection rules and correlation searches using SPL, aligned with the MITRE ATT&CK framework, improving alert fidelity and reducing false positives. Conduct proactive threat hunting for CVE exploitation, insider threats, suspicious PowerShell activity, and lateral movement across endpoint, identity, and cloud telemetry. Investigate phishing incidents using Proofpoint and Microsoft 365 Defender, extracting and blocking IOCs through threat intelligence integrations. Analyze cloud security alerts across Azure, AWS, and Microsoft Defender for Cloud, producing incident reports with root cause analysis and remediation guidance.

Assistant System Engineer

Tata Consultancy Services (TCS)

Jul 2024 - Nov 2024

Monitored and investigated security events across global customer environments using Splunk and QRadar, performing alert triage and escalation in accordance with defined SLAs as an L1 SOC Analyst. Investigated phishing campaigns, brand abuse, malicious URLs, scam domains, and account compromise incidents using threat intelligence platforms such as VirusTotal, IPVoid, and MXToolbox. Analyzed network-based attacks including DoS/DDoS and MITM, producing incident reports with containment actions and remediation recommendations. Developed SIEM dashboards, correlation rules, and reports to improve threat visibility and SOC operational efficiency. Performed malware analysis and threat intelligence correlation to identify IOCs and support detection improvements. Collaborated with WAF and infrastructure teams to investigate web-based threats and implement IP blocking and mitigation strategies.

Education

Bachelor of Technology (B.Tech.) - SRM Institute of Science & Technology

- 2024 · Afghanistan

Certifications

Certified Ethical Hacker

· 2026

Comptia Security+

· 2026

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 19/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 5/5
Verified 5/5
Total Score 84/100

Profile Overview

Member sinceMar 2026

Skills (14)

Threat Detection and Hunting Alert Triage Incident Response IOC Analysis Phishing Investigation QRadar Splunk Microsoft Sentinel CrowdStrike Falcon Microsoft Defender for Endpoint +4 more