Working as a security analyst in the SOC team, triggering suspicious or malicious activity for all endpoints in SentinelOne (S1). Handling incidents containing Ransomware and other attacks and assisting clients in identifying malicious activity, triage analysis, compromised user accounts, attacker footholds, active malware, etc. Performing analysis on various incidents containing Ransomware, Malware, Exploits, phishing, and various Cyber-attacks, finding their persistence, and taking appropriate actions. Handling Security Incidents followed by containment, eradication, and recovery with proper evidence collection and documentation until the closure of the incident. Worked on IBM QRadar SIEM administration and correlated logs from different sources, fine-tuned correlation rules, and created reports and dashboards for SOC. Experienced on Qradar (SIEM)-related alerts that are raised as part of the L1 team's investigation and triage. Experienced in Sumo logic SIEM administration, creating use cases and dashboards for SOC. SIEM: QRadar, Sumo logic. Performing proactive Threat Intelligence using global feeds and working on cloud security platforms like Microsoft Azure. Worked on data breach incidents (concerning PII, sensitive, employee-centric and consumer data). Expertise in Malware analysis, upgrades, and various troubleshooting using Falcon Crowd Strike, Sentinel One and Symantec. Proficient in Email Security threats and Anti-spam analysis, including various Email headers. Analyzing security flaws based on the logs and informing the customer regarding the same. Experience in performing malware analysis and threat hunting.
EDR: Sentinel One, Falcon Crowdstrike, DATP