About
Results-driven SOC Analyst with 3 years of experience in 24×7 security operations, specializing in threat detection, incident response, and SIEM monitoring. Experienced in Microsoft Sentinel and DNIF for log analysis, threat intelligence investigation, and security monitoring. Strong understanding of MITRE ATT&CK framework, endpoint security, and incident lifecycle management. Proven ability to improve detection accuracy and ensure SLA compliance.
Skills & Expertise (15)
Work Experience
SOC Analyst (L1)
TATA Consultancy Services Ltd.
Present - Present
Performed 24×7 monitoring of Windows, firewall, VPN, and endpoint logs using Microsoft Sentinel and DNIF. Investigated phishing, malware and suspicious login alerts and performed incident triage. Investigated IPs, domains, and file hashes using threat intelligence tools to validate and contain malicious activity. Managed incident lifecycle including detection, analysis, containment, and remediation. Reduced false positives by optimizing SIEM correlation rules, improving detection efficiency by 25%. Developed and tuned security use cases for improved threat detection. Conducted proactive threat hunts aligned with MITRE ATT&CK to uncover undetected anomalies. Prepared daily, weekly, and monthly reports (DSR, WSR, MSR) summarizing threat trends and remediation actions. Coordinated with L2 analysts and client teams to drive incident containment and ensure timely closure.
Education
Bachelor of Technology (B.Tech) - RVR & JC College of Engineering
2018 - 2022 · Afghanistan