

Results-driven SOC Analyst with 3+ years of hands-on experience monitoring, triaging, and investigating security events across SIEM, EDR, and cloud environments. skilled in threat detection, incident response, and vulnerability management. Known for effective team collaboration, adaptability in dynamic environments, and results-driven approach. Equipped with expertise in network monitoring, risk assessment, and security protocols, ensuring reliable protection and mitigation strategies. Recognized for analytical thinking, problem-solving abilities, and unwavering focus on achieving organizational goals.
• Monitored and triaged security alerts using SIEM tools (Crowdstrike, Splunk, Sentinel, QRadar), validating true positives vs. false positives and escalating high-severity incidents to L2.
* Performed malware triage by detonating suspicious files and URLs in sandbox environments (Any.Run, Hybrid Analysis, Joe Sandbox) to extract IOCs, behavioral patterns, and command-and-control indicators.
• Performed initial investigations on suspicious activities, including failed logins, malware detections, phishing attempts, and anomalous network traffic.
• Conducted IP, URL, and file reputation analysis using tools such as VirusTotal, AbuseIPDB, OTX, Shodan, and WHOIS.
• Analyzed authentication logs, endpoint alerts, and network events to determine impact, scope, and source of alerts.
• Executed L1 containment actions such as blocking malicious IPs, isolating endpoints, disabling compromised accounts, and notifying IT/IR teams when required.
• Monitored real-time security events across SIEM, EDR, firewall, IDS/IPS, and cloud security dashboards to detect potential threats.
• Investigated phishing alerts by analyzing email headers, sender reputation, attachment behavior, and user activity logs.
• Performed user behavior analysis to identify unusual login patterns, privilege misuse, or suspicious access attempts.
• Generated daily, weekly, and monthly SOC reports summarizing incidents, threat trends, and operational metrics.
• Mapped alerts, malware behavior, and investigation findings to MITRE ATT&CK techniques to identify adversary TTPs, validate attack stages, and improve detection coverage.
• Documented all investigations thoroughly, including alert details, root cause findings, actions taken, and recommendations for SIEM tuning.
• Followed established incident response procedures and playbooks to ensure consistent and timely handling of security events.
• Ensured all SOC activities followed security policies, incident response procedures, and compliance requirements (SOC2, HIPAA, ISO27001).
• Collaborated with senior analysts to improve detection rules, reduce false positives, and strengthen overall SOC operations.