Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

SAHIL ASATI

Mumbai

Summary

I am a dedicated security professional with 4 years of experience in Security Operations Center roles. My expertise includes comprehensive SIEM tool monitoring, threat detection, and incident response. Skilled in risk analysis and proficient in various cybersecurity frameworks, I effectively identify and mitigate vulnerabilities to protect organizational assets. I am committed to continuous improvement and teamwork in enhancing security posture

Overview

4
4
years of professional experience
1
1
Certification

Work History

SOC Analyst

TATA Communication Limited
08.2023 - Current
  • Monitor and identify any suspicious security events using the LogRhythm(SIEM Tool) and Checkpoint EDR
  • Analyzing events on CYBLE and Izoologic for cyber threat intel
  • Worked on log source and integration of window servers and syslog device in LogRhythm
  • Troubleshooting of critical log sources when logs are not reporting to SIEM
  • Create some LogRhythm contents like dashboards, filters, field sets, active channels, Query and Reports
  • Collecting the logs from all network devices and security devices and analyze the logs to find suspicious activities and identify whether it is true positive or false positive
  • Raise ticket for Blocking of IP's domains, hash values on security devices & AV if found malicious
  • Worked with various teams across the organizations to improve security posture
  • Actively listened to customers, handled concerns quickly and escalated major issues to supervisor
  • Reduced false alarms by fine-tuning intrusion detection system configurations based on historical analysis of incidents.

SOC Analyst L1

KYOTO ENVIRO TECH Private Limited
01.2021 - 07.2023
  • Performed risk analysis 24/7.
  • Monitor and identify any suspicious security events using the ArcSight ESM Console.
  • Monitored use of data files and regulated access to protect secure information
  • Troubleshooting of critical log sources when logs are not reporting to SIEM.
  • Create some ArcSight contents like dashboards, filters, field sets, active channels, Query and Reports.
  • Collecting the logs from all network devices and security devices and analyze the logs to find suspicious activities and identify whether it is true positive or false positive.
  • Raise ticket for Blocking of IP's domains, hash values on security devices & AV if found malicious

Education

B.Tech - Electronics and Telecommunications

CSVTU
Bhilai

Skills

  • SIEM
  • LOGRHYTHM
  • EDR
  • IDS
  • Troubleshooting & Fine tunning
  • Incident Response
  • ISO 27001
  • ISMS
  • DHCP
  • DNS
  • TCP
  • Email Analysis
  • Malware analysis
  • Teamwoek

Certification

  • SIEM- LogRhythm Security Analyst (LRSA) Certification
  • SIEM- LogRhythm Platform Administration (LRPA) Certification
  • ISO 27001
  • ISMS
  • GRC

Timeline

SOC Analyst

TATA Communication Limited
08.2023 - Current

SOC Analyst L1

KYOTO ENVIRO TECH Private Limited
01.2021 - 07.2023

B.Tech - Electronics and Telecommunications

CSVTU
SAHIL ASATI