Back to Developers
vignesh vadla

vignesh vadla

SOC Analyst L1

Hyderabad, India 6+ yrs exp 90 · Outstanding

About

Entry-level Cybersecurity Analyst with hands-on SOC monitoring experience — built and operated a Wazuh + Suricata environment detecting 556+ real security events across four MITRE ATT&CK categories. Co-filed an Indian Patent for an AI-driven SOC intelligence system using Isolation Forest anomaly detection — identifying 14 events missed by standard rule-based detection. Skilled in alert triage, false positive analysis, log correlation, IOC enrichment, incident documentation, and detection rule writing. SC-200 (Security Operations Analyst) certification in progress. Available for 24x7 rotational shift schedules.

Skills & Expertise (42)

Security Event Monitoring Advanced
8.5/10
2
Years Exp
Wazuh Advanced
8.3/10
2
Years Exp
Suricata Advanced
8.0/10
2
Years Exp
ELK Stack Advanced
7.8/10
2
Years Exp
Python Intermediate
7.5/10
2
Years Exp
Nmap Windows Server TCP IP IDS IPS Firewall Basics EDR Endpoint Security Packet Analysis VirusTotal AbuseIPDB Active Directory basics Cloud Security Basics Azure AWS Kali Linux Ubuntu Incident Ticketing Elasticsearch Kibana Splunk Microsoft Sentinel Alert Triage False Positive Analysis Incident Response Playbook Execution SOAR concepts WIRESHARK Security Documentation MITRE ATT&CK Cyber Kill Chain NIST CSF OWASP Top 10 IOC Analysis TTP Analysis Vulnerability Management

Work Experience

Cybersecurity Job Simulation

Deloitte Australia (Forage)

Jun 2025 - Present

Parsed HTTP logs to trace a simulated breach: identified initial access vector, mapped lateral movement, wrote an executive-level incident response report.

IAM Security Simulation

Tata Group via Forage

Feb 2025 - Present

Audited enterprise user accounts, applied least-privilege access controls, produced IAM remediation documentation for a simulated TCS security review.

SOC Analyst

SOC Home Lab

Jan 2024 - Present

Built a two-machine lab with Wazuh Manager on Ubuntu and Suricata NIDS on Kali Linux; configured agent enrollment, log forwarding, and real-time cross-host alert correlation. Detected and triaged 556+ live security events — brute force (T1110), network scanning (T1046), exploit attempts (T1190), and C2 patterns (T1071) — each documented with incident reports and false positive analysis. Wrote custom Suricata IDS detection rules targeting port scan behavior and suspicious HTTP headers; built Kibana dashboards showing alert severity, volume trends, and attacker TTPs. Automated IOC enrichment via Python using VirusTotal and AbuseIPDB APIs, reducing manual IP and hash reputation lookups during triage; applied playbook-driven response workflow. Performed initial incident triage, documented investigation findings, and followed SOC escalation procedures for simulated security incidents.

Developer

Python Brute-Force Log Analyzer

Jan 2024 - Present

Wrote a multi-threaded Python script to parse Linux auth logs, flag repeated failed logins, and output structured incident summaries — validated with zero false positives across all test cases.

Education

Diploma in Electronics & Communication Engineering - Vijay Rural Engineering College

2020 - 2023 · Afghanistan

B.Tech in Cybersecurity - MLRITM

- · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 15/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 90/100

Profile Overview

Member sinceMay 2026

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation