Having 3.4 Years of Security Analyst Experienced with years of working in the area of security operation Including Incident Management, and log analysis through SIEM Responsible for 24x7 shared SOC Operations including log Monitoring through Azure sentinel and IBM QRADAR Tool. Hands on Experience on Incident response activities - Malware Analysis, Brute force Analysis, Phishing Email Analysis. Hands on Experience Incident Life Cycle Management. Experience in creating the SOP Runbooks for the alerts coming in dashboard Expertise in creating the WSR and DSR reports and sending regularly to the CISO and the team Performing security incident detection, detailed investigation Of incidents and managing service level agreements Troubleshoot performance and availability issues on security devices such as IDS, IPS, UTM and Content filtering solutions, Data Loss/Leak Prevention, Anti Virus, Encryption, APT,VPN, SSL & TLS. Providing L1 Support in resolving alerts generated by complex network, end point and log analysis performance. Analyze the network traffic Firewall, IDS, IPS events, logs and evaluate effectiveness of existing security controls. Perform ongoing monitoring and threat analysis, Analysis logs/traffic. To escalate the incidents and appropriately manage and record them. Expert in Microsoft Excel- Look up, Proficient on Pivot table Creation. Conduct details analytics queries and investigations, identifies area that require specific attention, Identity Indicator of Compromise (IOC) and Indicator of attacker (IOA). Coordinate with other external stakeholders and vendors. Act as a mentor and team lead to all first level security analysts, support and supervise them, ensure knowledge transfer within the team.