About
Security Analyst with 4+ years of experience in Security Operations, Incident Response, and Threat Hunting. Expert in alert triage, SIEM monitoring, malware analysis, and stakeholder reporting. Committed to strengthening enterprise security posture against evolving cyber threats.
Skills & Expertise (22)
Work Experience
SOC Analyst L1
Capgemini Technology Services India Limited
Present - Present
Monitored and analyzed security alerts in real time within SOC environments. Investigated endpoint malware, suspicious URLs, and network threats. Utilized SIEM tools including IBM QRadar, Azure Sentinel, and Splunk. Validated alerts using VirusTotal and MXToolbox. Executed sandbox analysis for suspicious files and URLs. Mapped incidents to MITRE ATT&CK and Cyber Kill Chain frameworks. Worked with IOC feeds to block malicious IPs, URLs, and hashes. Managed incidents in ServiceNow within SLA timelines. Coordinated with SIEM Admin teams on log ingestion issues. Created runbooks, custom use cases, and shift handover reports.
SOC Analyst L2
Capgemini Technology Services India Limited
Dec 2021 - Present
Led investigation and triage of escalated incidents, assessing severity and business impact. Reduced false positives through alert validation and tuning. Performed advanced malware, phishing, and intrusion analysis using sandbox environments. Conducted proactive threat hunting using intelligence feeds and behavioral analytics. Prepared daily, weekly, and monthly security reports with root cause analysis. Developed and maintained incident response playbooks and SOPs. Mentored L1 analysts and improved investigation quality. Produced compliance-ready incident documentation.
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Need Sponsorship
Relocation
Open to Relocation