Summary
Overview
Work History
Education
Skills
Certification
Projects
Timeline
Generic

Hemanth Mallam

Katy

Summary

Results-driven SOC Analyst with expertise in threat detection and incident response. Proficient in triaging alerts and analyzing phishing campaigns using SIEM, EDR, and IDS/IPS tools. Collaborates effectively with cross-functional teams to investigate security incidents and enhance SOC processes. Dedicated to continuous learning to address evolving cyber threats.

Overview

3
3
years of professional experience
1
1
Certification

Work History

Middleware Administrator

S-Square Systems
02.2023 - 06.2023
  • Have experience installing WebLogic12c using GUI, Silent, Console mode.
  • I have experience in Domain Creation, configuring Machines and Node Managers in WebLogic Development and production Environments.
  • Created Cluster environment in WebLogic domain servers.
  • Created Servers & Machines and created clusters and deployed applications.
  • Involved in creating domains by using GUI, Command Line and WLST.

SOC Analyst

Deitya Infotech
07.2020 - 02.2023
  • Investigated and prioritized security alerts from SIEM, EDR, and IDS/IPS tools, reducing false positives by 25% through refined tuning and analysis.
  • Performed initial incident triage using ELK, Microsoft Sentinel, and Splunk, escalating critical threats to Tier 2/IR teams for rapid response.
  • Ensured compliance with security policies, standards (ISO 27001, NIST, GDPR, etc.), and regulatory requirements.
  • Analyzed phishing emails, examined headers/attachments, and identified malicious links using Microsoft Defender for Office 365.
  • Monitored network and endpoint security tools (firewalls, Snort IDS/IPS) to detect and respond to anomalous activity.
  • Implemented Microsoft Sentinel Automation Rules and Logic App Playbooks to auto-remediate threats and reduce incident triage time by 40%.
  • Gained hands-on exposure to tools like Snort, Wireshark for threat analysis and network traffic inspection.
  • Collaborated with IT, threat intelligence, and IR teams to contain and remediate incidents, reducing mean time to resolution (MTTR) and Utilized the MITRE ATT&CK framework to map and analyze adversary tactics and techniques, improving threat detection and incident response effectiveness.
  • Documented incidents in Jira and updated SOC playbooks to standardize future response efforts.

Education

Master’s - Information System And Technology

University of North Texas
Denton, TX

Skills

  • Microsoft Sentinel and Splunk
  • ELK stack
  • Microsoft Defender for Endpoint and Sentinel One
  • Phishing investigation and malware detection
  • Log analysis
  • Wireshark and Snort IDS/IPS
  • TCP/IP networking
  • Firewall policies (PfSense)
  • Incident triage and escalation
  • Documentation management

Certification

CompTIA Security+ Certification

Projects

  • Monitored Logs to Identify Anomalies, Investigate Suspicious Domains like DNS, HTTP, SSH, DHCP, FTP AND SMTP using Splunk SIEM Tool.
  • Built the Cyber Home Lab from ZERO and Catch Attackers using Microsoft Sentinel.
  • Completed a hands-on project focused on automating incident response using Microsoft Sentinel’s Automation Rules and Logic App Playbooks.
  • Built a virtualized cybersecurity lab using pfSense, Kali Linux, and Ubuntu to simulate and mitigate a SYN flood DoS attack; configured firewall rules, DHCP scopes, and threat detection in a controlled network environment.

Timeline

Middleware Administrator

S-Square Systems
02.2023 - 06.2023

SOC Analyst

Deitya Infotech
07.2020 - 02.2023

Master’s - Information System And Technology

University of North Texas