Back to Developers
Vikram

Vikram

Security Analyst (L1)

Hyderabad, India 4+ yrs exp 94 · Outstanding

About

Results-driven Security Analyst with 2.8 years of hands-on experience in Security Operations Center environments. Proven ability to monitor, triage, and investigate security incidents using industry-leading SIEM and endpoint platforms. Adept at detecting threats, analyzing phishing campaigns, and reducing false positives through precise log correlation. Experienced with Microsoft Defender for Endpoint, CrowdStrike Falcon, Splunk, Rapid7, Proofpoint TAP/TRAP, Datadog, and AWS cloud security monitoring (CloudTrail, CloudWatch). Strong working knowledge of the MITRE ATT&CK framework and incident response lifecycle, with a track record of escalating confirmed incidents to L2 with comprehensive investigation reports.

Skills & Expertise (22)

Security Event Monitoring Advanced
8.3/10
2.8
Years Exp
log correlation Advanced
7.8/10
2.8
Years Exp
Splunk Intermediate
7.4/10
2.8
Years Exp
Datadog Intermediate
7.4/10
2.8
Years Exp
Microsoft Defender for Endpoint Intermediate
7.4/10
2.8
Years Exp
False Positive Reduction Escalation workflows Phishing Investigation IOC Analysis MITRE ATT&CK framework Cloud Security Posture Management IAM Monitoring S3 EC2 CloudWatch AWS CloudTrail Proofpoint TAP Threat Detection Process Tree Analysis Rapid7 InsightIDR CrowdStrike Falcon Alert Triage

Work Experience

Security Analyst – L1

Foundever

Jan 2022 - Present

Monitored and triaged security alerts from Datadog SIEM, Splunk, and Microsoft Defender for Endpoint, covering endpoint, network, and cloud environments. Performed initial investigation of suspicious activities including malware behavior, unauthorized access attempts, and anomalous user activity. Correlated logs across multiple sources to eliminate false positives and prioritize confirmed security events for escalation. Investigated phishing campaigns using Proofpoint TAP sandbox analysis — examining malicious URLs, attachments, and sender infrastructure. Executed email remediation using Proofpoint TRAP, removing malicious emails from affected enterprise mailboxes post-delivery. Identified and documented IOCs (IP addresses, domains, file hashes) associated with phishing and social engineering attacks. Analyzed AWS CloudTrail and CloudWatch logs to detect suspicious authentication attempts, privilege escalation, and IAM policy misuse. Investigated endpoint alerts using Microsoft Defender and CrowdStrike Falcon — reviewed process trees, command-line execution, and file system activities. Leveraged Rapid7 InsightIDR for vulnerability context during investigations. Detected suspicious Python executions, WAF blocks, and AWS resource anomalies via Datadog and Splunk alert correlation, with cloud security posture checks using CrowdStrike Falcon. Escalated confirmed security incidents to SOC L2 teams with detailed investigation reports, IOC summaries, and recommended containment actions. Maintained accurate incident documentation in ticketing systems, ensuring full audit trails for each investigation.

Education

Bachelor of Engineering (B.E.)

- · Afghanistan

Certifications

CompTIA Security+

· 2026

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 14/15
💰 Rate 0/5
🏆 Certs 5/5
Verified 5/5
Total Score 94/100

Profile Overview

Member sinceApr 2026

Availability Details

Relocation

Not Open to Relocation