Back to Developers
vram challagali

vram challagali

Security Operations Analyst

Chennai 3+ yrs exp 88 · Excellent

About

Security Operations Analyst with 3+ years of experience in cloud security monitoring, Incident Response, vulnerability remediation, and Threat Detection across enterprise environments. Skilled in Azure Security Operations, SIEM/EDR/XDR analysis, cloud governance, network security, and compliance-aligned security practices. Experienced in documenting security standards, evaluating new technologies, performing threat hunts, and collaborating with engineering, security, and operations teams to strengthen the security posture. Strong understanding of PCI-DSS, HIPAA, and GDPR aligned controls.

Skills & Expertise (35)

threat detection and analysis Advanced
8.7/10
4
Years Exp
Incident response and Management Advanced
8.5/10
4
Years Exp
Email/Phishing Investigation Advanced
8.2/10
3
Years Exp
Malware Investigation Advanced
8.0/10
3
Years Exp
Root Cause Analysis Advanced
8.0/10
4
Years Exp
Threat Intelligence Advanced
8.0/10
4
Years Exp
MITRE ATT&CK framework Advanced
8.0/10
4
Years Exp
Malware Analysis Advanced
7.9/10
3
Years Exp
SOAR (Cortex XSOAR) Advanced
7.8/10
4
Years Exp
Network Security (FireEye NX) CISCO Talos Sandbox (Recorded Future, Wildfire and FireEye AX) Threat intelligence portals (Recorded Future, Virus Total, Abuse IPDB, Cisco Talos, URLScanIo) Email Phishing Investigation Cisco Iron port FireEye NX Recorded Future Wildfire Virus Total AbuseIPDB Email Security: FireEye EX, Microsoft Defender, Cisco IronPort CASB (M Vision) Microsoft Defender Azure Active Directory UEBA-GRA Google Workspace Cortex XDR CrowdStrike Falcon Insight SIEM (IBM QRadar) Triage IOC correlation Alert Enrichment Pattern Recognition Log and Network Analysis

Work Experience

Cyber Security Analyst (SOC Analyst)

Tata Consultancy Services

May 2022 - Present

Monitoring and security internal devices and employee security. Worked with different security tools for overall analysis and to mitigate risks. Tools like EDR, SIEM, Azure AD, XDR, etc. Respond to alerts from SIEM in real time and mitigate by blocking the IP’s/Domains on Firewalls and Proxy servers. Handle alerts triggered from associate’s devices through EDR for unauthorized/unusual/malicious executables or PUP’s and thereby mitigating the threat by network isolating the host and perform necessary remediation measures accordingly. Investigate Host / Event/ Network timeline logs for suspicious obfuscated executions and perform root cause analysis, thereby providing suitable solutions. Investigate possible domain impersonation, typo squat and on possible leaked credentials based on intel received from Threat Intelligence platform. Investigate alerts from Google Workspace for suspicious user activity and phishing mail. Investigate alerts from Attivo-Deception technology. Monitor and analyze malicious behavior without exposing actual assets and identify attacker tactics and techniques. Respond to CASB and Prisma alerts to handle incidents from services hosted in the cloud. Investigate malicious phishing emails, domains, and IPs using appropriate open-source tools and recommend appropriate remediation for the same with detailed report. Security Architecture & SOP Documentation. Monitored cloud environments (Azure AD, CASB, Prisma Cloud) for security alerts, misconfigurations, suspicious login patterns, and policy violations. Responded to SIEM and EDR alerts in real time; identified and mitigated threats involving malware, obfuscated scripts, PUPs, unauthorized executables, and privilege anomalies. Investigated and remediated cloud, network, and endpoint vulnerabilities. Conducted regular IOC and TTP-based threat hunts across endpoints and cloud infrastructure. Analyzed phishing attacks, malicious domains, file hashes, and URLs using sandboxing and TI sources. Perform threat hunt across the organization by checking IOC’s through TTP’s and perform mitigation/remediation accordingly and maintaining detailed report for the same. Manage L1’s in shift and monitor alert flow to keep track SLA and to ensure critical alerts are not missed. Collaborated with cross functional teams to make the work more efficient. Regular communication with L1/L2/L3 Analyst Managers as part of the investigation results in a solution to the problem quickly and more effectively.

Education

Bachelor of Technology in Electrical and Electronics Engineering - Ideal Institute of Technology

- · Afghanistan

Certifications

No certifications added yet

Interested in this developer?

Profile Score Breakdown

📷 Photo 10/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 20/20
🎓 Education 10/10
⏱️ Experience 13/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 88/100

Profile Overview

Member sinceMar 2026

Availability Details

Visa Status

Need Sponsorship

Relocation

Depends on Offer