· I have 6+ years of experience in SOC, with a demonstrated history of working with multiple organizations spread across different industries and 100+ countries.
· Investigating and responding to security incidents by Triage incident details, analyzing root causes, and recommending remediation strategies
· Incident response Analyst or Incident coordinator for high priority or major widespread incidents like DDOS, APT attacks ... and was responsible for mitigating the risk, coordinating with stakeholders, Clients, and Preparing the RCA of the incident.
· Mentoring the L1 analysts on monitoring, investigating through the tools available and other operational activities, assigning the tasks.
· Expertise in complete M365 Defender security stack i.e. Azure Sentinel, Microsoft Defender for Endpoint, MDO, MDI, MDCA
· Building and fine-tuning the existing correlation rules for improved alerting of incidents.
· Prepared Incident Response Plan & Standard Operating Procedure.
· Creating Monthly Reports, Dashboards and presenting SOC Metrics to management.
· Shift lead in the monitoring team and providing L2 support to stakeholders/clients on handling security incidents.
· Performing client engagement and conducting discussions on several threat scenarios, upcoming trends in security.
· Active involvement in threat research around various open- source tools and portals.
· Involved with the content team at client location in investigating and probing False Positives and work with them to whitelist/fine-tune current processes.
· Triaging, reporting for the logs flowing through the event sources and event traffic patterns.
· Mentoring the L1 analysts on monitoring, investigating through the tools available and other operational activities.
· Perform risk assessments on Microsoft Defender for cloud.
· Perform detailed investigation and response to security alerts in Microsoft Security Stack, RSA SA and several High priority security incidents i.e., attacks like DDoS, Data leakage, APT etc.
· Analysis of IOCs and providing end to end investigation on zero-day security incidents.
· Analysis of Spoofed Emails/malicious attachment/malicious URLs.
· Perform threat hunting and creation of detection rules on Sentinel through KQL (Kusto Query Language).
· Create Process and Procedures for Handling High Priority Incidents (Data Leakage, DDoS etc.).
· Troubleshooting in log parsing and log quality checks.
Incident Response
Cloud Security and Content Management (Azure)
Workbook creation on Microsoft Sentinel
Threat Hunting
SIEM (RSA Net witness, Azure Sentinel, Q-Radar, ArcSight)
Google Suite /Google Admin
Network Firewalls, proxy technologies, EDR(MDE)
Email Security: Protection (TAP) & Proofpoint Protection on Demand (POD)
Ticketing Tool: BMC Remedy Tool, ServiceNow, RSA Archer
MICROSOFT Security Stack (M365D)
Microsoft Sentinel
Microsoft Defender for Cloud (MDC)
Microsoft Identity Protection (MDI)
Microsoft Defender for Endpoint (MDE)
Microsoft Defender for Cloud Apps
Microsoft AD Identity Protection
Microsoft Defender for Office