Summary
Overview
Work History
Education
Skills
Certification
Tools - SIEM, EDR & XDR
Timeline
Generic

Siva Raj Mattaparthi

Hyderabad

Summary

As a skilled SOC Analyst with extensive hands-on experience in various security technologies, including SIEM, EDR, and XDR solutions such as QRadar, Microsoft Sentinel, CrowdStrike, SentinelOne, Carbon Black, Cortex XDR, Microsoft Defender for Endpoint, and Symantec Endpoint Protection. I specialize in security monitoring, incident response, threat hunting, and forensic analysis, ensuring an organization's security posture remains resilient against evolving cyber threats. Passionate about developing security use cases, fine-tuning rules, and proactively mitigating security risks.

Overview

3
3
years of professional experience
1
1
Certification

Work History

Lead Solution Advisor

Deloitte
03.2024 - 05.2025
  • 3.5 years of hands-on experience in Cyber Security, specializing in Security Operations Center (SOC) monitoring, threat analysis, and incident response.
  • Conduct proactive threat hunting using SIEM and EDR solutions to detect advanced persistent threats (APTs).
  • Categorizing, prioritizing, and escalating security incidents according to industry-standard frameworks (MITRE ATT&CK).
  • Developing and implementing security use cases in SIEM and EDR platforms to enhance detection capabilities.
  • Monitor, analyze, and respond to alerts from IDS/IPS systems, ensuring timely detection and mitigation of intrusion attempts and policy violations.
  • Investigate email-based threats, and deploy anti-phishing measures.
  • Implementing policies related to endpoint protection, including device controls, network controls, and behavior monitoring.
  • Taking immediate action on indicators of compromise (IOC) by blocking the hash values, blacklisted IPs, and domains on respective security devices.

Analyst

Cognizant
01.2024 - 03.2024
  • Performing malware analysis, isolating threats, and mitigating attack vectors.
  • Investigate the device timeline before and after the alert detection, and summarize its trigger or how it started.
  • Investigate the malware file, looking into when it was first seen, how it got to the device, and where it was downloaded from. Also, investigate all the possible ways to see where the file is present inside the organization.
  • Collaborating with cross-functional teams to investigate security events and coordinate remediation efforts.

Senior Analyst

Security HQ
01.2022 - 01.2024
  • Investigation and actions will be taken based on security events, and remediation will occur as per standard operating procedures.
  • Fine-tuning SIEM and EDR correlation rules to reduce false positives and improve alert accuracy.
  • Creating and maintaining Standard Operating Procedures (SOPs) for security incident handling.
  • Generating and analyzing daily, weekly, and monthly security reports for senior management.
  • Perform sandbox activity on files, and analyze the behavior of the files.

Education

Bachelor Of Technology - BTech - Mechanical Engineering

JNTU
Kakinada
01.2017

Skills

  • Security monitoring
  • Incident response
  • Threat hunting
  • End point management and malware analysis
  • Forensics and log analysis
  • Network security
  • Phishing analysis
  • Security use case development
  • Fine-tuning
  • Incident coordination and threat mitigation
  • Data Loss Prevention (DLP)

Certification

  • ECIH - EC-Council's
  • SIREN (SentinelOne IR Engineer) - SentinelOne
  • Defender For Endpoint Ninja Training - Microsoft
  • Sentinel Ninja Training - Microsoft

Tools - SIEM, EDR & XDR

  • QRadar
  • Azure Sentinel
  • Crowdstrike
  • SentinelOne
  • Carbon Black
  • Harmony Endpoint
  • Symantec Endpoint Protection
  • Microsoft Defender for Endpoints
  • Trend Micro Vision One
  • Cortex XDR
  • Cortex XSIAM

Timeline

Lead Solution Advisor

Deloitte
03.2024 - 05.2025

Analyst

Cognizant
01.2024 - 03.2024

Senior Analyst

Security HQ
01.2022 - 01.2024

Bachelor Of Technology - BTech - Mechanical Engineering

JNTU
Siva Raj Mattaparthi