Candidate Name
Passionate about cyber security and Talented Cyber Security Analyst with 1 years of Hands on experience of different SIEM tools such as IBM Qradar, Azure Sentinel, Sentinel, Logpoint, Sentinel-one EDR. Experienced in 24*7 Security operation of SOC Team, EDR, Malware analysis, Incident Management, Incident response and Threat hunting. Professional in analysing and problem-solving skills to identify risks and threats as well as EDR solutions such as Bitdefender and SentinelOne. Solid foundation in computer networking and event managements. Good with Presentation Skills and Ready to help team achieve company goals.
Proficient in working with Qradar, Log-Point, and Azure Sentinel SIEM tools.
Monitored security alerts and events in real-time, demonstrating a proactive approach to threat detection.
Detecting and promptly addressing incidents by raising tickets within SLA timelines.
Providing detailed incident reports and ensuring proactive follow-up with clients for timely ticket closure.
Conducted in-depth analysis of security logs, network traffic, and system events to identify malicious activities.
Maintained detailed documentation of security incidents, investigations, and resolutions.
Conducting daily activities, creating technical reference documents, and performing health checks for SIEM tools Build daily, weekly, and monthly reports as per SOC Manager requirements.
Directly contacting customers regarding suspicious alerts as part of incident response responsibilities.
Generating monthly reports and sharing them with clients Analysing and documenting phishing emails reported by client end-users.
Conducting IOC hunting in the client's environment to detect and analyse suspicious activity and creating detailed documentation summarizing the findings.
Responded promptly to security incidents, containing, and mitigating threats to minimize impact.
01/08/2024
01/11/2022
01/04/2018