Back to Developers
YV

Yashwanth Vodeti

SOC Analyst

Not specified
63
Profile Score

About

Dedicated SOC Analyst with 3+ years of experience securing network and enterprise environments. Skilled in SIEM, Endpoint Security. My goal is to leverage my expertise in threat detection, incident response, threat hunting, and real-time monitoring and analytics. Passionate about continuous innovation and collaborative problem-solving, I am eager to contribute to a forward-thinking cyber security team dedicated to safeguarding organizational assets.

Skills & Expertise (8)

Splunk Advanced
8.3/10
3
Years Exp
7
Proficiency
6
Experience
10
Recency
8
Demand
Microsoft Defender Advanced
8.3/10
3
Years Exp
7
Proficiency
6
Experience
10
Recency
8
Demand
SentinelOne Advanced
8.3/10
3
Years Exp
7
Proficiency
6
Experience
10
Recency
8
Demand
Threat Detection Advanced
8.3/10
3
Years Exp
7
Proficiency
6
Experience
10
Recency
8
Demand
Incident Response Advanced
8.3/10
3
Years Exp
7
Proficiency
6
Experience
10
Recency
8
Demand
Threat Hunting Advanced
8.3/10
3
Years Exp
7
Proficiency
6
Experience
10
Recency
8
Demand
collaboration Advanced
8.3/10
3
Years Exp
7
Proficiency
6
Experience
10
Recency
8
Demand
Risk Management Advanced
8.3/10
3
Years Exp
7
Proficiency
6
Experience
10
Recency
8
Demand

Work Experience

SOC Analyst

KLR Digitech Pvt Ltd

04-2022 - Present

Demonstrated hands-on expertise in analyzing and responding to real-time security alerts using Splunk SIEM. Performed threat hunting using Microsoft Defender and SentinelOne. Investigated Indicators of Compromise (IOCs) using open-source tools and recommended endpoint blocking strategies. Utilized Abnormal AI for advanced email threat detection and prevention. Prepared daily, weekly, SOC reports, highlighting key metrics and trends. Participated in daily shift handovers to ensure smooth operational transitions and continuity. Proficient in Splunk Search Processing Language (SPL) and Kusto Query Language (KQL) for log extraction and analysis. Experienced in investigating IOCs, fine-tuning false positives, and recommending endpoint security actions. Participated in cross-functional war-room calls during critical security incidents. Led daily threat triage operations using Splunk, validating alerts and coordinating with different teams to ensure swift resolution of security events within defined SLAs. Perform deep dive threat analysis and incident response. Delivered SOC services in a 24x7 environment, safeguarding client networks from intrusion attempts. Accurately documented validated security incidents (true positives) for future reference and analysis. Analyze the nature and source of security threats, understanding their tactics, techniques, and procedures. Utilized Defender and SentinelOne EDR, Zscaler proxy to conduct in-depth analysis of endpoint threat detections. Applied MITRE ATT&CK and Cyber Kill Chain frameworks to map and understand security incidents. Monitored EPS spikes, identified silent log sources, and conducted health checks on critical infrastructure.

SOC Analyst

KLR Digitech Pvt Ltd

04-2022 - Present

Demonstrated hands-on expertise in analyzing and responding to real-time security alerts using Splunk SIEM. Performed threat hunting using Microsoft Defender and SentinelOne. Investigated Indicators of Compromise (IOCs) using open-source tools and recommended endpoint blocking strategies. Utilized Abnormal AI for advanced email threat detection and prevention. Prepared daily, weekly, SOC reports, highlighting key metrics and trends. Participated in daily shift handovers to ensure smooth operational transitions and continuity. Proficient in Splunk Search Processing Language (SPL) and Kusto Query Language (KQL) for log extraction and analysis. Experienced in investigating IOCs, fine-tuning false positives, and recommending endpoint security actions. Participated in cross-functional war-room calls during critical security incidents. Led daily threat triage operations using Splunk, validating alerts and coordinating with different teams to ensure swift resolution of security events within defined SLAs. Perform deep dive threat analysis and incident response. Delivered SOC services in a 24x7 environment, safeguarding client networks from intrusion attempts. Accurately documented validated security incidents (true positives) for future reference and analysis. Analyze the nature and source of security threats, understanding their tactics, techniques, and procedures. Utilized Defender and SentinelOne EDR, Zscaler proxy to conduct in-depth analysis of endpoint threat detections. Applied MITRE ATT&CK and Cyber Kill Chain frameworks to map and understand security incidents. Monitored EPS spikes, identified silent log sources, and conducted health checks on critical infrastructure.

Interested in this developer?

Profile Score Breakdown

📷 Photo 0/10
📄 Resume 10/10
💼 Job Title 10/10
✍️ Bio 10/10
🛠️ Skills 13/20
🎓 Education 0/10
⏱️ Experience 15/15
💰 Rate 0/5
🏆 Certs 0/5
Verified 5/5
Total Score 63/100

Profile Overview

Member sinceJan 2026

Availability Details

Current Company

Other

Visa Status

No Visa

Relocation

Open to Relocation

Skills (8)

Splunk Microsoft Defender SentinelOne Threat Detection Incident Response Threat Hunting collaboration Risk Management