Team Leader experienced in directing activities of workgroups. Develops strategies, provides training, sets goals and obtains team feedback. Excellent interpersonal and communication skills. Big picture focus with excellence in communicating goals and vision to succeed. Problem solver, networker, and consensus builder.
SIEM Expertise:** ArcSight, Splunk, QRadar, McAfee, Azure Sentinel, Elasticsearch, RSA NetWitness.
- **EDR Solutions:** Endgame, Microsoft ATP, Microsoft Defender for Cloud, Microsoft XDR.
- Incident Response and forensic analysis.
- Hands-on experience in vulnerability assessment tools (e.g., Nessus).
- Skilled in threat hunting and threat intelligence.
- Proficient in log source management, custom rule creation, and system health checks.
- Strong communication and interpersonal skills, adaptable to challenging environments.
Ø Managed security incident response and log analysis using ArcSight SIEM, enhancing organizational threat detection and prevention capabilities.
Ø Conducted consolidated log analysis from operating systems, databases, networks, and security devices to identify intrusion attempts.
Ø Implemented and configured security devices, servers, databases, and applications within ArcSight SIEM.
Ø Reviewed logs and developed customized security reports and alerts based on client requirements.
Ø Troubleshot discrepancies in log flow and monitored log integrity to ensure effective security monitoring.
Ø Analyzed and managed incidents, refining use cases and criteria to reduce false positives and improve incident management efficiency.
Ø Oversaw 24/7 Security Operations Center (SOC) operations, focusing on real-time event monitoring, incident detection, tracking, and reporting.
Ø Experienced in identifying and analyzing phishing sites, collaborating with ISPs and vendors for takedown efforts.
Ø Identified custom reporting needs and translated them into SIEM technical specifications for implementation.
Conducted daily and monthly trend analyses, recommending improvements to enhance overall security posture.
Operations management
Ø Good interpersonal and communication skills, committed, hardworking, team player, quick learner and Flexible to adopt to challenging environments/technologies
Ø Experience in vulnerability assessment (Nessus) and providing security advisories to the customer
Ø Experienced in Threat hunting , threat intelligence
Ø Administration & maintaining Endgame Server & Sensors (Windows, Linux)
Ø Hands on experience in EDR (Endpoint Detection Response) solution -Endgame,Microsoft ATP, Microsoft Defender for clound, Microsoft XDR
Ø Incident Response and forensic analysis
Ø Worked in various roles in starting from L1 till SOC Manager
Ø Specialized in SIEM – ArcSight,Splunk, Qradar, Mcafee, Azure Sentinel, Elasticsearch, RSA Net witness
Acting as SOC manager / SDM manager Also, Provide SME support for SIEM implementation
Prepare Incident reports, Policies & schedules in Cyber Fusion SOC Environment
Functional responsible for SOC Operations
Standards & Frameworks Implementation
Review the standard for operating procedures and SOC Operations
Manage License & SLA’s, process improvement, Gap Analysis and analysis of the team’s KPI
Process improvement
Operations management
CEH