About
Security Operations Analyst with hands-on experience in threat detection, incident response, and detection engineering across hybrid and cloud environments. Proven ability to triage high-volume alerts, tune SIEM detections, and automate SOAR workflows to improve detection accuracy and reduce MTTR. Experienced in MITRE ATT&CK-aligned adversary simulations, SOC playbook development, and cloud security monitoring across AWS and Azure. Strong background in Python-driven automation, log correlation, and building scalable security operations platforms.
Skills & Expertise (7)
Work Experience
Cyber Risk Intern
CyberSRC Consultancy Pvt. Ltd.
09-2024 - 12-2024
Reviewed and analyzed Wazuh alerts and event data to identify anomalies, validate configurations, and support security monitoring activities. Developed and maintained security documentation, including procedures, findings summaries, and remediation guidance based on Wazuh observations. Prepared audit-ready evidence to support reporting and Wazuh operations.
Cyber Risk Intern
CyberSRC Consultancy Pvt. Ltd.
09-2024 - 12-2024
Reviewed and analyzed Wazuh alerts and event data to identify anomalies, validate configurations, and support security monitoring activities. Developed and maintained security documentation, including procedures, findings summaries, and remediation guidance based on Wazuh observations. Prepared audit-ready evidence to support reporting and Wazuh operations.
Cyber Risk Intern
CyberSRC Consultancy Pvt. Ltd.
09-2024 - 12-2024
Reviewed and analyzed Wazuh alerts and event data to identify anomalies, validate configurations, and support security monitoring activities. Developed and maintained security documentation, including procedures, findings summaries, and remediation guidance based on Wazuh observations. Prepared audit-ready evidence to support reporting and Wazuh operations.
Security Operations Center (SOC) L1 Analyst Intern
Gardiyan System Security Technologies
05-2025 - 11-2025
Investigated and triaged 50-100+ weekly alerts across endpoints, identity, and network telemetry, improving detection reliability by ~30%. Enhanced detection precision by tuning 20+ rules in Microsoft Sentinel and other SIEM platforms, increasing detection accuracy by 25%. Developed and deployed 10+ SOC playbooks for critical threats (DoS, DNS tunneling, lateral movement, cloud exposures, and phishing), increasing response coverage by 40%. Automated workflows and dashboards in SIEM and SOAR platforms (Microsoft Sentinel, Tines, Shuffle), reducing manual effort by 40% and accelerating MTTR by 40%. Utilized Python and Bash to automate triage and enrichment, saving ~10 hours/week. Conducted MITRE ATT&CK-aligned adversary simulations, including T1003, T1059, T1078, and T1047, etc., improving detection coverage for lateral movement and credential abuse. Authored management playbooks for policy, risk management, and vendor assessments, improving executive-level reporting by 35%.
Security Operations Center (SOC) L1 Analyst Intern
Gardiyan System Security Technologies
05-2025 - 11-2025
Investigated and triaged 50-100+ weekly alerts across endpoints, identity, and network telemetry, improving detection reliability by ~30%. Enhanced detection precision by tuning 20+ rules in Microsoft Sentinel and other SIEM platforms, increasing detection accuracy by 25%. Developed and deployed 10+ SOC playbooks for critical threats (DoS, DNS tunneling, lateral movement, cloud exposures, and phishing), increasing response coverage by 40%. Automated workflows and dashboards in SIEM and SOAR platforms (Microsoft Sentinel, Tines, Shuffle), reducing manual effort by 40% and accelerating MTTR by 40%. Utilized Python and Bash to automate triage and enrichment, saving ~10 hours/week. Conducted MITRE ATT&CK-aligned adversary simulations, including T1003, T1059, T1078, and T1047, etc., improving detection coverage for lateral movement and credential abuse. Authored management playbooks for policy, risk management, and vendor assessments, improving executive-level reporting by 35%.
Security Operations Center (SOC) L1 Analyst Intern
Gardiyan System Security Technologies
05-2025 - 11-2025
Investigated and triaged 50-100+ weekly alerts across endpoints, identity, and network telemetry, improving detection reliability by ~30%. Enhanced detection precision by tuning 20+ rules in Microsoft Sentinel and other SIEM platforms, increasing detection accuracy by 25%. Developed and deployed 10+ SOC playbooks for critical threats (DoS, DNS tunneling, lateral movement, cloud exposures, and phishing), increasing response coverage by 40%. Automated workflows and dashboards in SIEM and SOAR platforms (Microsoft Sentinel, Tines, Shuffle), reducing manual effort by 40% and accelerating MTTR by 40%. Utilized Python and Bash to automate triage and enrichment, saving ~10 hours/week. Conducted MITRE ATT&CK-aligned adversary simulations, including T1003, T1059, T1078, and T1047, etc., improving detection coverage for lateral movement and credential abuse. Authored management playbooks for policy, risk management, and vendor assessments, improving executive-level reporting by 35%.
Education
Bachelor of Technology (B.Tech.)
2022 - 2026 · India
Bachelor of Technology (B.Tech.)
2022 - 2026 · India
Bachelor of Technology (B.Tech.)
2022 - 2026 · India
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Current Company
Other
Visa Status
No Visa
Relocation
Open to Relocation