OBJECTIVE
Summary
Overview
Work History
Skills
Project Desciption
RESPONSIBILITIES : SIEM
RESPONSIBILITIES : EDR
Education
Timeline
Personal Details
DECLARATION
Generic

Laxmanna Bura

SOC Analyst
Mumbai

OBJECTIVE

 Versatile, bilingual professional and ability to manage sensitive materials. Able to use various  security tools to perform logs and packet analysis. Finally, can perform malware analysis with the  overall objective to ensure confidentiality, integrity and availability of the systems, networks,  and data 

Summary

• Relavant 3+ Years of Experience in Cybersecurity/Information security Analyst with Proficient and Thorough Experience and Good Understanding of Information security.

• Specialized in proactive Network Monitoring of SIEM ( Splunk/Azure Sentinel)

• Security Analyst in Security Operation center(SOC) Environment on Splunk/Indexer/Search head and Azure Sentinel.

Overview

13
13
years of professional experience

Work History

SOC Analyst

Sutherland
Mumbai
08.2019 - Current
  • Splunk/Azure Sentinel SIEM (Security Information and Event Management) Platform is integrated set of products for collecting, analyzing, and managing enterprise event information.
  • They include software and appliances for Event Collection
  • • Log Management • Event Correlation • Compliance Automation
  • • Identity Monitoring . Major components used in this project are Forwarder, Indexer, and Search head
  • Recommend improvements in security systems and procedures
  • Performed risk analyses to identify appropriate security countermeasures

Senior IT Support Specialist

Alliance Technosoft Pvt Ltd
NewDelhi
10.2010 - 05.2016

Diagnose and provide support on computer system issues, including debugging, correcting, repairing, servicing, examining, installing operating system and other software, training, and troubleshooting computer hardware, printers, and other peripherals. Provide assistance to Employees on the use of software and hardware

IT Support Specialist

Net Soft Business Sustems
banglore
08.2006 - 09.2010

Skills

Splunk SIEMundefined

Project Desciption

 The Splunk/Azure Sentinel SIEM (Security Information and Event Management) Platform is an  integrated set of products for collecting, analyzing, and managing enterprise event information. They  include software and appliances for Event Collection 

 • Log Management 

 • Event Correlation 

 • Compliance Automation 

 • Identity Monitoring.The major components used in this project are Forwarder, Indexer, and Search  head 

RESPONSIBILITIES : SIEM

 Worked in a 24x7 Security Operations Center. Conduct log analysis using Splunk SIEM Tool. Analyse security event data from the network (IDS, SIEM). Perform static malware analysis on isolated virtual servers. Recognize potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews  and analyses of relevant event detail and summary information. Monitoring and analysis of security events to determine intrusion and malicious events. Search firewall, email, web or DNS logs to identify and mitigate intrusion attempts. Investigate malicious  phishing emails, domains and IPs using Open-Source tools and recommend proper blocking based on  analysis. Ensure the integrity and protection of networks, systems, and applications by technical enforcement of  organizational security policies, through monitoring of vulnerability scanning devices Research new and evolving threats and vulnerabilities with potential to impact the monitored  environment. Identify suspicious/malicious activities or codes. Hands on experience on the Incident Response activities like malware analysis, phishing analysis.  Working on assign ticket queue and understanding and exceeding expectations on all tasked SLA  commitments Escalating issues to level2 and management when necessary. Investigate incidents using Active Channels/ Dashboards/Events/Graphs/Annotations and reports.  Monitor real-time security events on SIEM (Splunk/Azure Sentinel) console and Event Analysis and  investigating and mitigation Good understanding on different types of attacks 

RESPONSIBILITIES : EDR

 Monitoring and perform in-depth analysis of security alerts using the Azure Sentinel platform. Exercise  incident handling processes across Windows, Mac, and Linux platforms. Perform malware analysis. Perform remote remediation of malware or malicious activity. Develop and improve processes for incident detection, triage, and the execution of countermeasures Produce high-quality written and verbal communications, recommendations, and findings to customer  management. Demonstrate industry thought leadership through blog posts, CrowdCasts, and other public speaking  events. Supervise internal programs or teams. Serve as the technical escalation point and mentor for lower-level analysts. Provide oversight and quality assurance for issues worked by lower-level analysts. Assist in the advancement of security processes and procedures. 

Education

B.com -

Sri Satya Sai University of Technology And Medical
Sehore

Timeline

SOC Analyst

Sutherland
08.2019 - Current

Senior IT Support Specialist

Alliance Technosoft Pvt Ltd
10.2010 - 05.2016

IT Support Specialist

Net Soft Business Sustems
08.2006 - 09.2010

B.com -

Sri Satya Sai University of Technology And Medical

Personal Details

 Marital Status : Married 

Languages Known : English,Hindi,Telugu.

 Preffered Location : PAN India

DECLARATION

 I Here by declare that the above furnished details are true and correct to the best of my knowledge 


( BURA LAXMANNA) 

Laxmanna BuraSOC Analyst