Back to Developers
sujishneswar 007

sujishneswar 007

Security Operations Analyst

Banglore, India
80
Profile Score

About

SOC professional with 3+ years of experience in incident response and management across enterprise environments. Hands-on expertise across SIEM tool Microsoft Sentinel for correlation analysis, investigations, dashboards, and reporting. Good incident handling and drive containment and remediation with cross-functional teams within SLAs. Experienced SPOC for customers, management and comfortable with ITIL processes.

Skills & Expertise (18)

SOC Monitoring Advanced
8.5/10
3
Years Exp
SIEM Operations Advanced
8.4/10
3
Years Exp
Incident Response Advanced
8.3/10
3
Years Exp
Microsoft Sentinel Advanced
8.3/10
3
Years Exp
IOC Analysis ServiceNow KQL Logic Apps Microsoft Defender Customer Communication Weekly and Monthly Reports Workbooks Dashboards Retro Hunting Use-case tuning Health Checks Case Management Alert Triage

Work Experience

Cyber Defense & Resilience Consultant

Deloitte

Dec 2025 - Feb 2026

Supported continuous SOC monitoring and alert investigations using SIEM and endpoint tools; ensured accurate categorization, prioritization, and evidence capture. Performed daily incident audits to validate triage quality, documentation accuracy, and status updates. Mapped incidents and detections to the MITRE ATT&CK framework for consistent classification and communication. Supported analysis of phishing, malware, brute-force attempts, suspicious PowerShell activity, and lateral movement signals.

Security Delivery Analyst (SOC)

Accenture

Dec 2022 - Dec 2025

Monitor, analyze, and triage security correlation alerts across Microsoft Sentinel and validate true positives using event context and asset criticality. Investigate and respond to incidents including phishing, malware detections, suspicious logins, and anomalous user activity; document evidence, scope, and actions taken. Execute incident response lifecycle: identification, containment coordination, remediation guidance, and closure with clear timelines and lessons learned. Perform retro hunting and IOC-based investigations (domains, IPs, URLs, hashes) to identify related activity and support proactive risk reduction. Fine-tune SIEM use cases and correlation rules to reduce false positives, improve signal-to-noise ratio, and enhance analyst efficiency. Build and maintain dashboards and operational reports (weekly/monthly metrics, incident trends, noisy sources, detection coverage) and present outcomes to stakeholders. Perform connector and log source health checks to ensure stable data ingestion and dependable alerting. Handle ad-hoc requests for custom investigations and event/log analysis, providing concise findings and recommended actions. Create and maintain runbooks and operational documentation; delivered weekly/monthly incident trend reporting.

Education

B. Tech (E.C.E) - Sree Vidyanikethan engineering college

- 2022 · Afghanistan

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation

Skills (18)

SOC Monitoring SIEM Operations Incident Response Microsoft Sentinel IOC Analysis ServiceNow KQL Logic Apps Microsoft Defender Customer Communication +8 more