Results-driven SOC Analyst with 3+ years of experience in 24/7 security operations, monitoring, detecting, and responding to cybersecurity incidents across endpoint, email, and network environments. Proven expertise in incident triage, threat analysis, IOC enrichment, alert investigation, and risk mitigation using SIEM, EDR, and email security platforms. Experienced in handling phishing, malware and other cyber threat incidents while collaborating with cross-functional teams to deliver timely containment, remediation, and reporting. Strong ability to operate in fast-paced SOC environments and continuously adapt to evolving threats and security technologies.
Overview
3
3
years of professional experience
1
1
Certification
Work History
SOC Analyst L2
CyberProof - UST
05.2024 - Current
Lead advanced investigations for escalated security incidents, collaborating with internal SOC teams and external stakeholders to ensure timely containment and resolution.
Perform IOC enrichment, threat hunting, and malware analysis using sandbox environments to assess file behavior and determine threat severity.
Conduct root cause analysis and provide actionable remediation recommendations aligned with organizational security policies.
Deliver SOC operational review presentations to stakeholders, highlighting incident trends, response effectiveness, and improvement areas.
Execute remediation actions using administrative privileges, including blocking malicious IOCs, managing email security alerts, and dismissing user risk where appropriate.
Actively support SOC process improvements to reduce false positives and improve detection accuracy..
SOC Analyst L1
CyberProof - UST
08.2022 - 04.2024
Monitored and investigated security alerts and incidents, analyzing logs and telemetry to determine impact, root cause, and remediation steps.
Utilized EDR platforms such as CrowdStrike, Cybereason, and Microsoft Defender to detect, analyze, and respond to endpoint threats.
Identified and analyzed phishing emails through header analysis, payload inspection, and content review.
Leveraged email security gateways including Mimecast and Proofpoint to investigate and mitigate email-based threats.
Conducted OSINT-based reputation analysis on URLs, IP addresses, and file hashes to support incident triage and response.
Recognized with UST – USTAR Award and multiple appreciations for outstanding performance, resulting in promotion to SOC Analyst L2.
Education
BSc. - Cyber Forensics
STAS | Mahatma Gandhi University
Kerala
08-2021
Skills
Incident Response
Malware analysis
Threat hunting
Log analysis
Leadership
Presentation skills
Cyber threat analysis
Effective Communication
Critical Thinking
SIEM Tools
Phishing detection
IOC enrichment
Endpoint security
Team player
Certification
Certified Ethical Hacker Certified by EC-Council (CEH)
Certified SOAR Analyst (CSA) - Chronicle Google
Chronicle SIEM Fundamentals
Certified Penetration Tester Certified by Red Team Hacker Academy