About
Highly accomplished Cybersecurity Professional with over 6 years of hands-on experience in safeguarding enterprise systems and sensitive data through the implementation of robust security measures. Demonstrated success in threat detection, incident response, and security analytics across diverse environments. Proficient in SIEM platforms including Splunk, LogRhythm, QRadar, Azure Sentinel, and skilled in Palo Alto Networks technologies including Next-Generation Firewalls (NGFW) and Cortex XDR. Adept in leveraging security frameworks such as MITRE ATT&CK and the Cyber Kill Chain to drive effective detection and response strategies. Known for strong analytical and problem-solving abilities, exceptional communication skills, and a proactive approach to staying current with evolving threats and technologies.
Skills & Expertise (98)
Work Experience
Sr. Cyber Security Analyst
Informatica
Sep 2023 - Present
Monitored and analyzed security events across enterprise and cloud environments using Microsoft Sentinel, Splunk, and Palo Alto Cortex, improving detection and alert correlation. Responded to cybersecurity alerts, performing triage, containment, and remediation using SIEM, SOAR, and EDR platforms. Managed and monitored endpoints with Microsoft Defender for Endpoint, applying behavioral baselines and custom detection rules to reduce vulnerabilities. Conducted threat analysis, detecting anomalous behavior, insider threats, and system vulnerabilities. Integrated threat intelligence feeds into security platforms to enhance alert enrichment and identify emerging attack vectors. Conducted comprehensive vulnerability assessments to identify and mitigate security risks for the organization. Utilized vulnerability scanning tools to assess system weaknesses and implement corrective actions as a cybersecurity professional. Applied scripting knowledge to develop custom security tools and streamline incident response processes. Analyzed system logs to detect and respond to security threats, ensuring the integrity of the cybersecurity environment. Utilized Nessus for vulnerability assessments and penetration testing to identify and mitigate security risks. Utilized Bash scripting to streamline system administration and security monitoring, improving overall cybersecurity posture. Implemented robust security measures to protect sensitive data transmitted via TCP connections. Configured DNS settings and records to optimize performance and enhance security. Applied strong problem-solving skills to identify and mitigate cybersecurity threats, protecting sensitive data and systems. Automated SOC processes and workflows using Python scripting and SOAR tools to improve response time and operational efficiency. Generated and maintained technical documentation, including incident reports, mitigation strategies, and security operations procedures. Implemented robust security management strategies to protect sensitive data and systems within the cybersecurity domain. Applied Networking Fundamentals to secure network infrastructure and protect sensitive data. Supported continuous improvement in security operations by fine-tuning processes, SIEM rules, and detection methodologies. Protected sensitive data and critical systems within the Financial Services sector while ensuring adherence to regulatory requirements. Secured desktop applications against emerging cyber threats, ensuring data integrity and user privacy for cybersecurity professionals. Applied advanced forensics techniques to investigate and resolve complex cybersecurity incidents Managed end-to-end cybersecurity project delivery, implementing robust security measures, risk mitigation strategies, and policy enforcement. Implemented robust risk management strategies to safeguard sensitive data and systems within the cybersecurity domain.
Data Analyst
NTT Data
Jun 2015 - Jan 2020
Security operations center, Cryptanalysis, solve complex problems, DDoS prevention, Prepare Reports, Sense of urgency, Information Security, Identity Access Management, Source code management, Security Systems, Incident response, Intrusion test oversight, Database security, Phishing detection, Endpoint protection, Disaster recovery, Threat intelligence, DDoS mitigation, Problem Solving Skills, Zero-day exploit prevention, Intrusion detection, Log analysis, IoT security, Encryption algorithms, Data loss prevention, Security protocols, Scripting languages, SIEM tools, Cloud security, Security audits, Ethical hacking, Threat modeling, Security Assessments, Strong Problem solving skills, Accountability, Time management, Adaptability and flexibility, Multitasking Abilities, Technical Expertise, Detail-oriented, Organization Skills.
Soc Analyst
Vmware
Feb 2020 - Aug 2023
Monitored and triaged security events using Splunk, Microsoft Sentinel, and Palo Alto Cortex XSIAM to ensure early detection and timely escalation of potential incidents. Analyzed alerts to eliminate false positives and escalated validated security events to Level 2 analysts for advanced investigation. Prioritized alerts based on severity, asset criticality, and business impact to support efficient incident response. Generated SOC reports (daily and weekly) summarizing alert trends, incident volumes, and response activities for internal review. Maintained and fine-tuned SIEM correlation rules and detection logic to improve alert fidelity and reduce noise. Provided Level 1 operational support across SIEM, IDS/IPS, endpoint security, and firewall log monitoring, ensuring continuous visibility. Created, updated, and tracked incident tickets in case management systems, ensuring accurate documentation and adherence to response SLAs. Collaborated with IT and infrastructure teams to validate anomalies and apply immediate containment actions when necessary. Managed and optimized SOC dashboards to provide real-time visibility into event trends, system health, and rule performance. Followed SOC playbooks and SOPs to respond to phishing, malware, and unauthorized access attempts. Maintained operational continuity through shift handovers, incident review calls, and knowledge sharing with SOC team. Communicated incident details, containment actions, and response steps to stakeholders to ensure coordinated remediation. Contributed to SOC process improvement by documenting new use cases, refining detection logic, and recommending rule tuning based on activity trends.
Education
BTech (CSC) - JNTU- Kakinada
- 2012 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation