Summary
Overview
Work History
Education
Skills
Tools
Certification
Timeline
Generic

BHUPATHI TADIVAKA

Vijayawada

Summary

Senior Security Consultant with 5+ years of experience in SOC operations, incident response, and threat intelligence. Skilled in SIEM use case development, EDR, vulnerability management, and Windows AD/Domain administration. Experienced in coordinating global incident response, mentoring SOC analysts, and enhancing detection accuracy using tools like Splunk, QRadar, Microsoft Sentinel, CrowdStrike, and Qualys. Recognized for reducing false positives, improving security posture, and driving efficient incident handling.

Overview

6
6
years of professional experience
1
1
Certification

Work History

Senior Security Consultant

Blue Yonder
10.2024 - Current
  • Familiar with system administration in Windows Domain / Active Directory environments.
  • Proactively detect and analyze suspicious activity using SIEM, EDR, and threat intelligence tools, performing advanced triage and incident investigations.
  • Develop and fine-tune SIEM use cases and alerting queries to reduce false positives and enhance detection accuracy.
  • Coordinate incident response and troubleshooting across global teams, ensuring timely remediation and reporting.
  • Collaborate with stakeholders to address vulnerabilities and strengthen infrastructure security posture.
  • Document incidents in ServiceNow, ensuring SLA adherence and effective communication throughout the lifecycle.
  • Mentor SOC analysts on threat hunting, use case development, and investigation techniques.
  • Strong grounding in core IR concepts including phases of response, vulnerabilities vs threats vs actors, and IoCs.
  • Experienced in coordinating complex incident response across global organizations.

Cyber Intelligence Analyst

Stratejm - a Bell Canada Company
03.2023 - 03.2024

    • Implement Incident Response protocols and promptly inform SAAS clients of potential security incidents within a security-focused organization.
    • Guided junior analysts in investigation of complex security incidents, fostering culture of learning and development.
    • Utilize a range of security platforms and tools including firewalls, SIEM Tools such as FortiSIEM and IBM Qradar, and SOAR solutions like Microsoft Sentinel, Qualys, Cyglass, Crowd Strike Falcon, and Microsoft O365 Defender.
    • Reduced false positive alerts in security monitoring systems by fine-tuning detection parameters, enhancing operational efficiency.

Cyber Security Analyst

Linamar Corporate
01.2022 - 12.2022
  • Review logs and utilize querying tools to determine the scope and impact of phishing and malware attempts.
  • Investigate reported phishing and spam emails.
  • Investigate and escalate incidents using ticketing tools such as ServiceNow.
  • Initiate requests for changes to security controls and propose solutions to mitigate security risks.
  • Tracking, reporting, and controlling incident communications with other teams.

SOC Analyst L1

IBM
05.2019 - 04.2021
  • Monitor security alerts and events generated by various security tools such as SIEM (Security Information and Event Management) systems, firewalls, IDS/IPS (Intrusion Detection/Prevention Systems), and endpoint protection platforms.
  • Collaborate with other teams, such as incident response, network operations, and system administrators, to mitigate security threats and vulnerabilities.
  • Stay abreast of emerging threats, vulnerabilities, and security technologies through continuous learning and professional development.
  • Ensured continuous system monitoring, detecting anomalies that could indicate potential security threats.
  • Maintained accurate documentation of all SOC activities, facilitating knowledge sharing across the organization.

Education

Post Graduate Diploma - Cyber Security and Computer Forensics

Lambton College
Mississauga, Canada
12.2022

Bachelors in Technology - Computer Science Engineering

K L University
Guntur, India
05.2019

Skills

    Incident Response & Coordination: IR Phases, IOC/IOA Analysis, Threat vs Vulnerability vs Actor distinction, Global Incident Management
    Threat Intelligence & Hunting: MITRE ATT&CK, Intel Correlation, Use Case Development, SOC Operations Optimization
    Security Monitoring & Analysis: Log Analysis, Use Case Tuning, False Positive Reduction
    Vulnerability & Risk Management: Identification, Assessment, and Mitigation of Threats
    Network, Cloud & System Security: Firewalls, IDS/IPS, Windows AD Hardening, SaaS Security Monitoring
    Analytical Thinking & Communication: Problem-Solving, Incident Escalation, Team Collaboration, Mentoring, Continuous Learning

Tools

  • EDR & Endpoint: CrowdStrike Falcon, SentinelOne, Symantec DLP
  • SIEM & SOAR: NG-SIEM(Crowdstrike), Splunk, QRadar, Microsoft Sentinel, FortiSIEM
  • Threat Intelligence: SOCRadar, CS-Recon, Recorded Future, MITRE ATT&CK
  • IAM & AD: Windows Domain / Active Directory, ServiceNow IAM
  • Cloud Security: Prisma/GP, Umbrella, Microsoft O365 Defender
  • Vulnerability Management: Qualys, Nessus, Tenable.io
  • Email Security: Proofpoint, Mimecast, Tessian

Certification

  • Certified Ethical Hacker- CEH

Timeline

Senior Security Consultant

Blue Yonder
10.2024 - Current

Cyber Intelligence Analyst

Stratejm - a Bell Canada Company
03.2023 - 03.2024

Cyber Security Analyst

Linamar Corporate
01.2022 - 12.2022

SOC Analyst L1

IBM
05.2019 - 04.2021

Post Graduate Diploma - Cyber Security and Computer Forensics

Lambton College

Bachelors in Technology - Computer Science Engineering

K L University
BHUPATHI TADIVAKA