Summary
Overview
Work History
Education
Skills
Roles & Responsibilities
Projects And Labs
Certification
Timeline
Generic

Sai Adimulam

Chirala

Summary

SOC Analyst specializing in cyber threat detection and vulnerability assessment. Demonstrated success in implementing security measures that enhance data integrity and confidentiality. Expertise in cybersecurity frameworks and incident response protocols, leading to improved system resilience against cyber threats.

Overview

1
1
year of professional experience
1
1
Certification

Work History

System Administrator

London
12.2023 - 01.2025
  • Managed Windows/Linux systems, user accounts, and network configurations.
  • Implemented basic security controls including patch management and access restrictions.
  • Monitored system performance and responded to technical incidents.
  • Assisted security teams with log collection and incident escalation.
  • Gained exposure to SOC operations including SIEM monitoring and alert triage.

Education

Master's -

Data Analytics
London, United Kingdom
09-2023

Bachelor of Science - Computer Science Engineering

JNTUK
08-2020

Skills

SIEM tools: Microsoft Sentinel

Log analysis: Windows and Linux logs, firewall and IDS/IPS logs

Networking fundamentals: TCP/IP, DNS, HTTP/HTTPS, VPN, routing and switching

Endpoint security: CrowdStrike

Traffic analysis: Wireshark

Roles & Responsibilities

  • Monitor, analyze, and investigate security alerts generated from SIEM tools (Microsoft Sentinel, Splunk, QRadar).
  • Perform log analysis of firewalls, IDS/IPS, proxies, and endpoint security solutions to detect anomalies and threats.
  • Conduct incident triage: classify, prioritize, and escalate security incidents as per defined playbooks.
  • Support incident response (IR) activities including containment, eradication, and recovery.
  • Identify and investigate suspicious activities, indicators of compromise (IoCs), and potential data breaches.

Projects And Labs

  • Brute Force Attack & Phishing Detection, Created detection rules in Microsoft Sentinel for failed login attempts and phishing alerts.
  • Log Ingestion & Analysis, Collected and ingested logs from different sources (VPN, Windows Event 4624/4625) into Sentinel for security analysis.
  • Threat Hunting Lab, Performed hunting in Sentinel using KQL queries to identify abnormal login patterns and suspicious activities.

Certification

  • Microsoft Sentinel-Udemy
  • AI tools-Be10x

Timeline

System Administrator

London
12.2023 - 01.2025

Master's -

Data Analytics

Bachelor of Science - Computer Science Engineering

JNTUK
Sai Adimulam