Dedicated and results-driven SOC Analyst with over 3.2 years of hands-on experience in Security Operations, Incident Response, and Threat Detection. Proficient in monitoring, triaging, and responding to complex security incidents using tools such as Cortex XDR, CrowdStrike, SentinelOne, Splunk, QRadar, and Microsoft Sentinel. Experienced in analyzing phishing attacks, endpoint threats, and user behavior anomalies across cloud and hybrid environments using Azure AD, Entra ID, FortiSASE, FortiCASB, and Office Defender Cloud. Skilled in vulnerability management (Nessus), SIEM rule tuning, and integrating threat intelligence from platforms like Digital Shadows. Strong understanding of DLP, WAF, IDS/IPS, and security best practices. Familiar with Jira and ServiceNow for incident lifecycle management and effective cross-team collaboration. Passionate about strengthening organizational security posture through proactive threat hunting, process automation, and continuous improvement.
Roles and Responsibilities:
Roles and Resposibilities:
I hereby declare that the information provided above is true to best of my knowledge.
(Raman)