About
Working as Senior security Analyst with 5.2+ years of Experiences. My part of the job is to monitoring security Events, investigating alerts, and responding to the potential threats in the enterprise environments. Strong knowledge of cybersecurity, threat vectors, risk, incident response and incident management. Skilled in incident triage, RCS, SLA adherence (MTTD/MTTR), shift leadership, mentoring juniors and Soc process improvement.
Skills & Expertise (36)
Work Experience
Senior Security Analyst
Microland Ltd
Oct 2022 - Present
Responsible for daily SOC operations in an MSSP environment, monitoring and supporting multiple customer environments. Monitor and investigate security alerts across multiple customer environments using SIEM, EDR, firewall, WAF, and cloud security platforms as part of daily SOC operations. Analyze alerts generated from multiple log sources including network devices, endpoint security tools, operating systems, authentication logs, cloud platforms, application logs, and email security systems. Perform initial triage and deep investigation of alerts to determine true positive or false positive activities. Handle and coordinate P1–P4 security incidents, ensuring response actions are completed within defined SLA timelines. Correlate security events using MITRE ATTCCK framework and Cyber Kill Chain methodology to identify attacker tactics and techniques. Lead incident investigation calls with internal teams and customers, provide investigation updates, and guide L1 analysts during incident response activities. Mentor L1 SOC analysts by reviewing investigations and providing technical guidance during security incident analysis. Develop dashboards within SIEM and EDR platforms to visualize security alerts, incident trends, and SOC operational metrics. Generate daily, weekly, and monthly SOC operational reports based on customer and business requirements.
Senior Security Analyst
Karur Vysya Ltd
Jul 2014 - Oct 2022
Worked as a Senior Security Analyst responsible for daily SOC operations in an MSSP environment, monitoring and supporting multiple customer environments. Monitor and investigate security alerts across multiple customer environments using SIEM, EDR, firewall, WAF, and cloud security platforms as part of daily SOC operations. Analyze alerts generated from multiple log sources including network devices, endpoint security tools, operating systems, authentication logs, cloud platforms, application logs, and email security systems. Perform initial triage and deep investigation of alerts to determine true positive or false positive activities. Handle and coordinate P1–P4 security incidents, ensuring response actions are completed within defined SLA timelines. Correlate security events using MITRE ATTCCK framework and Cyber Kill Chain methodology to identify attacker tactics and techniques. Lead incident investigation calls with internal teams and customers, provide investigation updates, and guide L1 analysts during incident response activities. Mentor L1 SOC analysts by reviewing investigations and providing technical guidance during security incident analysis. Develop dashboards within SIEM and EDR platforms to visualize security alerts, incident trends, and SOC operational metrics. Generate daily, weekly, and monthly SOC operational reports based on customer and business requirements.
Education
B.Tech (ECE) - Sri Sivani Institute of Technology
- 2012 · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation
Skills (36)
Click a skill to find developers with the same skill