Summary
Overview
Work History
Education
Skills
Certification
Timeline
Generic

Durga Sai Lakshmi Eeda

Summary

SOC Analyst with 3+ years of hands-on experience in Tier 1 and Tier 2 operations, focused on threat detection, alert triaging, and incident response. Proficient in using Splunk, QRadar, and EDR tools like CrowdStrike to analyze logs and investigate security events in real time. Skilled at optimizing SIEM rules, integrating threat intelligence, and coordinating with incident response teams to minimize risk exposure. Strong technical communicator with a passion for process improvement and automation using Python and Bash.

Overview

5
5
years of professional experience
1
1
Certification

Work History

Security Analyst

JPMorgan Chase
08.2024 - Current
  • Investigated SIEM alerts using Splunk and QRadar, analyzing logs across firewall, endpoint, and server layers to escalate verified threats.
  • Conducted in-depth analysis of IDS/IPS events, identifying reconnaissance attempts and correlating with threat intel to detect APT behavior.
  • Integrated external threat intelligence into SIEM to enrich events with context, boosting detection of zero-day and behavioral anomalies.
  • Authored post-incident documentation with root cause, IOCs, and containment actions, aligning with regulatory audit standards.
  • Monitored cloud infrastructure using Azure Sentinel, AWS CloudWatch, and GCP logging tools to detect threats and validate security control effectiveness.
  • Applied the MITRE ATT&CK framework and Cyber Kill Chain model to guide investigation, containment, and escalation processes during incidents.
  • Tuned use cases and correlation rules to reduce noise and improve detection of insider threats and credential-based attacks.
  • Collaborated with network and system teams to deploy patches, close vulnerabilities, and test incident playbooks in live environments.

Security Analyst

TATA Consultancy Services
01.2021 - 07.2023
  • Developed Python automation scripts to ingest threat intel feeds and alert security teams on IOC matches from real-time logs.
  • Created and customized dashboards within Splunk to visually track incident timelines, severity distribution, and alert sources.
  • Participated in regular threat-hunting operations, identifying indicators of compromise before traditional alerts triggered.
  • Collaborated with internal teams and stakeholders during incidents, delivering clear, timely communications and post-incident documentation for audit readiness.
  • Authored detection logic for phishing, brute force, and command-and-control traffic, reducing undetected alerts by 40%.
  • Integrated SOAR capabilities with case management tools, ensuring structured responses and automatic evidence collection.
  • Reviewed firewall and endpoint logs in ELK Stack, correlating events to detect lateral movement and privilege escalation.

Security Intern

HCL Technologies
08.2020 - 12.2020
  • Monitored TCP/IP and DNS logs in Splunk to identify suspicious behavior including repeated login failures and port scanning activity.
  • Assisted in configuring firewall policies and SIEM connectors, gaining hands-on knowledge in integrating network devices into SOC.
  • Documented playbooks for common incidents like phishing, malware, and web exploitation for L1 triage teams.
  • Participated in daily threat briefings and learned to interpret IOC feeds from public and commercial threat intel sources.
  • Created summary reports on alert trends and detection gaps observed during weekly review calls with L2 analysts.

Education

Masters's - Cyber Security

University of Central Missouri

Bachelor's degree -

Amrita Sai Institute of Science and Technology

Skills

  • SIEM tools: Splunk, IBM QRadar, Azure Sentinel, ELK Stack
  • EDR/XDR solutions: CrowdStrike, SentinelOne, Carbon Black
  • Scripting and automation: Python, Bash, PowerShell
  • Security operations: Incident response, Threat hunting, Log analysis
  • Networking protocols: TCP/IP, DNS, HTTP/S, VPNs, Firewalls
  • Cloud security: AWS (EC2, S3), Azure (AAD, AKS), GCP (Compute Engine)
  • Project management tools: ServiceNow, GitHub, Jenkins, GitLab, Jira
  • Operating systems: Windows, Linux (Ubuntu, RHEL), MacOS

Certification

  • CompTIA Security+ (In Progress – Expected 07/01/25)
  • Web Application Security Certificates from PentesterLab
  • Security Certificates from tryhack me
  • Advanced Executive Program in Cybersecurity from IIIT-B
  • Certified cyber warrior- Hackingflix.

Timeline

Security Analyst

JPMorgan Chase
08.2024 - Current

Security Analyst

TATA Consultancy Services
01.2021 - 07.2023

Security Intern

HCL Technologies
08.2020 - 12.2020

Masters's - Cyber Security

University of Central Missouri

Bachelor's degree -

Amrita Sai Institute of Science and Technology
Durga Sai Lakshmi Eeda