About
6-month experience at Deloitte as a SOC Analyst Monitored security alerts and incidents in a Security Operations Center (SOC) environment to detect suspicious or malicious activities. Investigated alerts generated by SIEM tools and analyzed logs to identify potential security threats. Performed initial triage and analysis of security incidents such as phishing attempts, suspicious URLs, malware alerts, and unauthorized access attempts. Used KQL queries and log analysis to search and correlate security events across multiple systems. Conducted threat analysis and incident investigation to determine the severity and impact of security alerts. Escalated confirmed incidents to higher-level security teams according to incident response procedures. Assisted in monitoring endpoint, network, and cloud security events to ensure protection of organizational systems. Documented investigation findings and created incident reports and case notes for tracking and future reference. Collaborated with SOC team members to improve threat detection and response processes.
Skills & Expertise (15)
Work Experience
SOC L1 Analyst
Deloitte
Present - Present
Worked as a SOC L1 Analyst at Deloitte for 6 months supporting an Australian client. Responsible for monitoring security alerts using Splunk and Microsoft Sentinel, investigating endpoint threats via Crowdstrike, managing incidents in ServiceNow, and performing log analysis and initial triage of security incidents. Real-time monitoring of security alerts. Log correlation and threat analysis. Endpoint investigation using EDR tools. Incident documentation and SLA tracking. Escalation of critical incidents. Created and managed incident tickets using ServiceNow and tracked tasks via Jira.
Education
Bachelor of Technology in EEE - Pace Institute
- 2025 · Afghanistan
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Need Sponsorship
Relocation
Open to Relocation