Back to Developers
Suvarna

Suvarna

Security Analyst

80
Profile Score

About

Security Analyst with 4+ years of experience in handling high-volume SOC operations with a strong focus on investigating complex alerts, improving detection quality, and reducing operational noise. Regularly works with SIEM and endpoint telemetry to identify real threats from large datasets, with hands-on involvement in alert tuning and incident handling. Known for practical investigation skills and ability to quickly validate and respond to suspicious activity in live environments.

Skills & Expertise (36)

Splunk Advanced
8.0/10
2
Years Exp
IBM QRadar Advanced
7.8/10
2
Years Exp
CrowdStrike Falcon Advanced
7.8/10
2
Years Exp
Microsoft Defender for Endpoint Advanced
7.5/10
2
Years Exp
Microsoft Sentinel Intermediate
7.0/10
1
Years Exp
Incident lifecycle management LINUX Escalation Handling Tenable Nessus Qualys OpenVAS CVE Prioritization ServiceNow Jira PagerDuty MITRE ATT&CK NIST CSF ISO 27001 CIS Controls Windows Playbook Execution MISP AlienVault OTX AbuseIPDB VirusTotal Threat Hunting Root Cause Analysis IOC Analysis Alert Triage Cisco ASA Palo Alto NGFW Suricata Snort Zeek WIRESHARK Carbon Black

Work Experience

Security Analyst

Nexxoft Infotel

Jan 2023 - Present

Monitored and triaged 10,000+ security events daily using Splunk and QRadar, identifying high-risk alerts and reducing false positives. Performed detailed investigations on endpoint and network alerts including malware detections, suspicious authentication activity, and lateral movement indicators. Conducted endpoint investigations using CrowdStrike and Microsoft Defender, including process analysis, command-line review, and host isolation actions. Tuned and optimized SIEM correlation rules, improving detection quality and reducing alert fatigue by 25%. Analyzed logs from endpoint, firewall, proxy, and authentication sources to identify anomalous behavior patterns. Investigated phishing incidents using email header analysis, sandboxing, and threat intelligence tools. Performed IOC-based and behavior-based analysis to validate alerts and identify potential compromises. Managed complete incident lifecycle in ServiceNow including triage, investigation, root cause analysis, and closure within SLA. Conducted network traffic analysis using Wireshark and Zeek to identify suspicious connections and potential command-and-control activity. Supported false positive reduction and detection improvement initiatives. Assisted in developing and updating SOC playbooks and standard response procedures. Mentored junior analysts and supported shift operations and escalation decisions.

System Engineer

Tata Consultancy Services

Dec 2021 - Dec 2022

Monitored and analyzed security alerts from SIEM dashboards and escalated suspicious activities based on severity. Assisted in IDS/IPS rule tuning (Snort, Suricata) to detect scanning activity and brute-force attempts. Performed log analysis using Splunk to identify suspicious login behavior and access anomalies. Supported vulnerability assessments using OpenVAS and tracked remediation progress through Jira. Assisted in phishing investigations by analyzing email headers, links, and attachments. Participated in patch validation processes to ensure timely remediation of vulnerabilities. Documented incidents and contributed to SOC standard operating procedures (SOPs).

Education

B.Tech in Electronics and Communication Engineering - Srinivasa Institute of Engineering and Technology

- 2020 · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 5/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 80/100

Profile Overview

Member sinceMar 2026