
SOC Analyst with proficient and thorough experience and a good understanding of Information Security. Specialized in proactive network monitoring through SIEM and assist with the development of processes and procedures to improve incident response times, analysis of incidents, and overall Security Operations Center functions, ensuring confidentiality, integrity and availability of the systems, networks, and data.
Log analysis
Certified Azure Admin Associate
· Having 6 years of relevant experience in Information Security and working as SOC Analyst in offshore Security Operations Center,
· Expertise in monitoring, investigating and mitigating the security incidents through SIEM Tools - IBM QRadar, Chronicle and Splunk
· Research and gather IOCs related to Malware/Ransomware/Phishing from various Threat Intelligence sites and working with the respective teams for blocking them after validation.
· Analyze and understand log sources utilized for the purpose of security monitoring, particularly security and networking devices such as Firewalls, Routers, Anti-Virus, Proxies, etc.
· Investigate malicious phishing emails, domains and IPs using open source tools and recommend proper blocking based on analysis.
· Analyzing the logs of critical alerts and reporting it to the respective end support teams for remediating with-in the defined SLA.
· Preparing and sharing Daily, Weekly and Monthly reports as per client requirement.
· Preparing Adhoc report for various event sources, customized reports and scheduled reports as per the requirement.
· Creating dashboards in as per client’s requirement.
· Create tickets for the necessary tasks that need to be executed by external teams. Ensure tasks are communicated via email to the respective teams and track down the open tickets, resolve them without breaching the SLA and annotating them from the bucket as per ticketing SOP.
· Working in 24x7 SOC environment to ensure the integrity and protecting networks, systems, and applications from serious intrusions.