To associate with an innovative and vibrant organization, allowing me to put my competencies to the best use, to add value to the organization and contribute to my overall growth as an individual.
Results-driven cybersecurity professional with 5+ years of hands-on experience in diverse roles including Team Lead and Senior Cybersecurity Analyst. Proficient in leveraging multiple SIEM tools to develop effective use cases and fortify network security through established industry standards and best practices. Adept at leading and managing teams to deliver client-focused solutions.
• Developed and implemented use cases and dashboards for clients, enhancing threat detection and data visualization.
• Monitored security systems and networks, identifying potential threats and building use cases to detect attack scenarios.
• Conducted investigations and provided recommendations to prevent future security incidents.
• Monitored network user activities for suspicious behavior or malicious activity.
• Delivered cybersecurity awareness training on various topics.
• Stayed updated on evolving cybersecurity trends and technologies.
• Designed and implemented dashboards for swift anomaly detection, prioritizing DDOS-centric panels.
• Created correlated use cases from scratch based on log analysis and research.
• Conducted CKC & MITRE mapping for existing and new use cases.
• Updated Indicators of Compromise (IOC) and reference sets for precise threat detection.
• Proficient in basic threat-hunting and anomaly-detection techniques.
• Managed a team of L1 members working in shifts.
• Administered the Performance Management System (PMS) for Level 1 support teams.
• Facilitated the establishment of performance goals and objectives for Level 1 support staff.
• Monitored high-triggering rules for investigation and fine-tuning.
• Ensured rule coverage for newly created devices.
• Created dashboards and reports in SIEM.
• Analyzed payloads and shared required field details for parsing.
• Troubleshooted and fine-tuned rules on a timely basis.
• Reviewed SOC reports weekly, monthly, and quarterly and presented findings to clients.
• Provided detailed incident analysis whenever required by L1.
• Maintained prompt communication with clients, delivering updates and issue resolutions.
• Facilitated SOC review meetings with internal teams and clients.
• Assisted clients with evidence and documents during audits and assessments.
• Managed multiple projects with strong organizational and time management skills.
• Developed standardized operating procedures (SOPs) for streamlined processes.
• Delivered security awareness training to employees and teammates.
• Conducted daily incident reviews.
• Created and reviewed runbooks for new use cases.
• Generated reports using PowerBi as needed.
• Collaborated with sales, engineering, and management teams for project success.
• Made recommendations to improve security procedures and systems.
• Provided support and mentorship to analysts in triaging, analyzing, and investigating incidents.
• Proficient in utilizing Cortex XSOAR for security orchestration, automation, and response tasks.
• Configured and customized Cortex XSOAR playbooks, integrations, incident types, fields, and layouts.
• Designed, developed, and maintained Cortex XSOAR playbooks to automate security tasks.
• Implemented best practices for playbook development to ensure scalability and maintainability.
• Managed operations to prevent, detect, and analyze computer network intrusions.
• Documented and analyzed events associated with alerts per Standard Operating Procedure.
• Conducted thorough threat hunting of logs to identify network anomalies.
• Created weekly and monthly SOC incident reports using Power BI.
• Monitored and analyzed security events and alerts from various sources, including SIEM tools, intrusion detection systems, firewall logs, and system logs.
• Handled tickets and tasks in the ticketing tool within defined SLA and customer requirements.
• Conducted daily logs analysis, case management, and incident response.
• Provided assistance to Senior analysts as needed for queries or additional analysis.
I, Manichandu, hereby declare that the information contained herein is true and correct to the best of my knowledge and belief.