Back to Developers
Vivek Kadari

Vivek Kadari

SOC Analyst

Hyderabad 3+ yrs exp 86 · Excellent

About

Possess of 3+ years as a SOC Analyst, specializing in SOC monitoring, alerting, incident response, and security investigations using advanced SIEM and SOAR platforms such as Splunk Enterprise and Cortex XSIAM. Skilled in malware analysis, KQL, SOAR automation, incident response, threat hunting, and vulnerability management across both cloud and on-premises environments. Adept at leveraging industry-leading technologies including Splunk, Cortex XSIAM, Azure Sentinel, IBM QRadar, EDR platforms to detect, analyze, and mitigate complex cyber threats. Proven track record in improving security posture, optimizing SOC processes, and delivering actionable insights that strengthen organizational defenses. Committed to continuous learning, staying aligned with the latest security trends, and providing innovative, scalable and proactive cybersecurity solutions.

Skills & Expertise (54)

Azure Sentinel Advanced
9.0/10
3
Years Exp
Cortex XSOAR Advanced
9.0/10
3
Years Exp
Incident Detection & Response Advanced
8.8/10
3
Years Exp
Correlation Advanced
8.8/10
3
Years Exp
Log Analysis Advanced
8.8/10
3
Years Exp
SIEM tools Advanced
8.7/10
3
Years Exp
Splunk SOAR Advanced
8.5/10
3
Years Exp
Malware Analysis Advanced
8.5/10
3
Years Exp
QRadar Advanced
8.5/10
3
Years Exp
Splunk Advanced
8.5/10
3
Years Exp
Bash SOAR platforms ProofPoint Abnormal VPNs Microsoft Defender SentinelOne CrowdStrike Vulnerability Management MITRE ATT&CK framework KQL SOAR Automation Threat Hunting Vulnerability Management Splunk Enterprise IBM QRadar EDR platforms Security investigations Incident Response Security Operations Center SOC Monitoring Alerting XDR Cortex Xsiam Network Security TCP IP DNS HTTP HTTPS Threat Intelligence IOC Analysis EDR Python IDS IPS Firewalls Antivirus Email Security Gateways OSINT Windows LINUX ServiceNow Jira

Work Experience

SOC Analyst

Cognizant

Aug 2022 - Aug 2025

Continuously monitored security events and alerts using SIEM tools (Splunk, QRadar, Cortex XSIAM, Azure Sentinel) to detect potential security incidents. Performed Tier 1 and Tier 2 incident analysis, including phishing attacks, malware infections, brute-force attempts, and suspicious network activity. Conducted detailed log analysis across firewalls, IDS/IPS, servers, endpoints, and cloud environments to identify root cause and scope of incidents. Monitored and investigated security alerts in Azure Sentinel, leveraging KQL queries to detect anomalies across endpoint, network, and identity logs. Developed custom KQL queries and analytics rules to identify suspicious patterns such as lateral movement, privilege escalation, and persistence techniques. Created and fine-tuned hunting queries in Sentinel to proactively search for Indicators of Compromise (IOCs) and emerging threat behaviors. Automated incident enrichment by correlating logs from multiple data sources (EDR, firewall, identity providers) using KQL. Built dashboards and workbooks in Azure Sentinel to visualize SOC metrics, incident trends, and threat hunting results for CXO reporting. Performed RCA (Root Cause Analysis) on escalated incidents by querying Sentinel’s data lake with advanced KQL joins, unions, and time-series functions. Integrated threat intelligence feeds into Sentinel and used KQL to match against known malicious IPs, domains, and hashes. Optimized detection rules and alert thresholds in Sentinel to reduce false positives and improve SOC efficiency. Participated in SOAR automation initiatives by linking Sentinel alerts with playbooks for automated response actions. Responded to incidents following established incident response playbooks, ensuring timely containment, eradication, and recovery. Analyzed Indicators of Compromise (IOCs) and leveraged threat intelligence feeds to enhance detection and response capabilities. Monitored and triaged incidents through Cortex XSOAR, leveraging automated playbooks to accelerate detection and response. Investigated alerts and enriched cases using integrated threat intelligence feeds, reducing manual effort and improving RCA quality. Developed and fine-tuned Splunk SOAR playbooks for phishing, malware, and endpoint compromise scenarios, cutting response time. Automated repetitive SOC tasks (IOC lookups, endpoint isolation, user account disablement) via XSOAR workflows, improving analyst efficiency. Generated daily/weekly dashboards in Cortex XSOAR highlighting incident trends, automation coverage, and SOC performance metrics. Maintained SOPs and incident logs within Cortex XSOAR to support governance, audit readiness, and continuous improvement. Contributed to cross functional initiatives like GenAI-driven enrichment and SOAR automation expansion, enhancing SOC maturity. Investigated phishing emails, malicious URLs, and attachments using sandbox, email security tools, and OSINT platforms. Generated daily/weekly reports from XSIAM dashboards highlighting incident trends, endpoint posture, and SOC performance metrics. Utilized EDR/XDR solutions to detect endpoint threats and perform host-based investigations. Reduced false positives by tuning SIEM rules, correlation searches, and alert thresholds. Monitored and triaged alerts in Cortex XSIAM, correlating endpoint, network, and identity telemetry to identify advanced threats. Investigated suspicious activity using XSIAM’s AI-driven analytics, performing root cause analysis (RCA) and documenting findings for incident reports. Executed automated response playbooks within XSIAM to isolate compromised assets, block malicious indicators, and reduce mean time to respond (MTTR). Fine-tuned detection rules and correlation policies in XSIAM to minimize false positives and improve detection accuracy. Integrated threat intelligence feeds into XSIAM for proactive detection of emerging IOCs and TTPs. Collaborated with SOC teams to escalate complex incidents, leveraging XSIAM dashboards for real-time visibility and reporting. Maintained SOPs and incident logs aligned with compliance requirements, ensuring audit readiness. Documented incidents, findings, and remediation steps in ticketing systems such as Service Now or Jira. Collaborated with IT, network, and security teams to remediate vulnerabilities and improve overall security posture. Supported compliance and audit requirements by maintaining accurate incident records and security documentation. Worked effectively in a 24/7 SOC environment, handling high-severity incidents under strict SLAs. Investigated alerts and enriched cases by integrating Splunk SOAR with SIEM, EDR, and threat intelligence platforms. Conducted proactive threat hunting across endpoints, networks, and cloud environments to identify hidden threats and anomalous behaviors. Leveraged EDR tools (SentinelOne, Falcon Crowdstrike, Microsoft Defender) and SIEM platforms (Azure Sentinel, Splunk, Cortex XSIAM) to build hunting queries and detect advanced attack techniques.

Education

B.Tech - Godavari Institute of Engineering & Technology

- 2021 · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 11/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 86/100

Profile Overview

Member sinceMay 2026

Availability Details

Visa Status

Citizen

Relocation

Open to Relocation