About
Senior Security Analyst with strong experience in SOC operations, threat analysis, incident response, and SIEM monitoring. Skilled in analyzing logs, detecting anomalies, investigating security incidents, and mitigating cyber risks across enterprise environments. Proficient in endpoint security, malware analysis, threat intelligence, and real-time monitoring. Adept at preparing detailed incident reports, managing escalations, and improving security posture in 24×7 SOC environments.
Skills & Expertise (22)
Work Experience
Security Analyst
Coordinates ME
Sep 2020 - May 2021
Conducted thorough threat detection and incident response in a high-pressure environment, ensuring rapid identification of security breaches. Managed Security Information and Event Management (SIEM) monitoring, enhancing organizational awareness of potential threats. Implemented and maintained robust cloud security protocols, significantly improving data protection measures. Developed and executed effective strategies for resolving security incidents, resulting in strengthened overall defenses and reduced response times.
SOC Analyst
Grapple soft solutions
May 2019 - Jul 2020
Security event monitoring and incident analysis. Log analysis and security threat investigation. Assisting in vulnerability assessments and phishing email analysis.
Senior Security Analyst
Gig-Gulf
Aug 2021 - Dec 2025
Working in a 24x7 SOC environment, monitoring security events, detecting and preventing intrusion attempts. Real-time event monitoring using SIEM tools such as Splunk. Analyzing threats, anomaly behavior, and incidents to determine their authenticity (false positive vs. True Positive). Strong hands-on experience in Splunk SPL (Search Processing Language) for writing complex queries to detect threats, perform log correlation, and create actionable insights. Fine-tuning false positives to optimize SIEM performance. Developed and optimized SPL queries for use cases like brute force detection, suspicious logins, data exfiltration, and malware activity. Reporting device health status to the content management team and troubleshooting issues. Conducting phishing, spam, and spear phishing email analysis. Utilizing EDR tools such as Microsoft Defender. Generating detailed reports with proper artefacts and recommendations. Performing log monitoring and incident analysis for Firewalls, IDS/IPS, databases, and web servers. Creating and managing filters, active channels, queries, rules, reports, and dashboards in Splunk. Investigated incidents by correlating data from multiple sources to determine root cause of security breaches. Monitored external threat feeds and advisories from vendors and government agencies to ensure timely remediation of vulnerabilities. Monitored current reports of computer viruses to determine when updated virus protection systems. Analyzed network traffic using intrusion detection systems and intrusion prevention systems to detect malicious activity. Investigated incidents related to data breaches, malware infections, denial-of-service attacks, taking corrective action as necessary.
Education
PGDM Cyber Security - Annamalai University
2019 - 2020 · Afghanistan
B.Tech - Sir C.R.R College of Engineering
2009 - 2013 · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation
Skills (22)
Click a skill to find developers with the same skill