Summary
Overview
Work History
Education
Skills
Timeline
Generic

Saisree Koripalli

SOC Analyst
Dallas,TX

Summary

Experienced IT professional with 5+ years of industry expertise, including 4.5 years as a SOC Analyst in fast-paced 24x7 SOC environments and 1 year as a Salesforce Administrator. Specialized in Security Operations Center (SOC) methodologies, excelling in incident handling, threat detection, log analysis, network traffic monitoring, and real-time event handling. Proficient in utilizing SIEM tools such as IBM QRadar, LogRhythm, Splunk, and LogRythm for monitoring, analyzing, and responding to cyber threats. Skilled in identifying, analyzing, and mitigating risks associated with cybersecurity breaches and vulnerabilities across network and application layers. Extensive hands-on experience with EDR tools (e.g., CrowdStrike, Microsoft Defender for Endpoint) and email threat protection tools (e.g., Proofpoint, Ironscales), as well as performing PCAP analysis and sandbox analysis to identify malicious activities. Strong knowledge of Intrusion Detection Systems (IDS), TCP/IP analysis, network protocols (HTTP), and operating systems (Windows/UNIX). Proven track record of creating detailed reports, conducting vulnerability assessments, and developing security policies aligned with organizational security goals. Effective communicator with exceptional relationship management and collaborative skills within cross-functional team environments. Developed critical cybersecurity skills in high-stakes settings, focusing on threat detection and risk mitigation. Transitioning into a new field to leverage expertise in analyzing security vulnerabilities and implementing safeguards. Committed to applying analytical and problem-solving abilities to protect and enhance organizational information security.

Overview

7
7
years of professional experience
2
2
Languages

Work History

Cyber Security Analyst

Verizon
Irving, TX
04.2023 - Current
  • Addresses the security incidents
  • Analyzes running processes and configs on affected systems
  • Carries out in-depth threat intelligence analysis to find the perpetrator, the type of attack, and the data or systems impacted
  • Creates and implements a strategy for containment and recovery
  • And maintaining constant communication with management, staff, and vendors to ensure proper operations of the organization such as receiving and investigating alerts daily
  • Reviews the most recent SIEM alerts to see their relevance and urgency
  • Serve as a Security Analyst in a 24x7 SOC environment, responsible for identifying and mitigating threats through proactive monitoring and real-time analysis of security events
  • Utilize tools like Nessus for vulnerability scanning, working with business owners to identify and remediate risks based on severity
  • Lead incident response efforts, ensuring swift containment, analysis, and resolution of security incidents within defined SLA
  • Conduct threat intelligence analysis to assess attack vectors and affected systems, coordinating containment and recovery strategies
  • Provide continuous security operations support, including monitoring logs from firewalls, proxies, AV, IPS/IDS, and cloud platforms (Amazon, Azure, Google)
  • Collaborate with cross-functional teams (Windows, Linux, network teams) for vulnerability patching, remediation, and risk mitigation
  • Performed regular reviews of user access rights, minimizing the risk posed by insider threats or compromised accounts.
  • Conducted security audits to identify vulnerabilities.
  • Streamlined user access controls, minimizing risk of unauthorized access to sensitive systems and data.
  • Reduced false positive alerts in security monitoring systems by fine-tuning detection parameters, enhancing operational efficiency.

Cyber Security Analyst

Kozy Kreative Concepts
08.2019 - 07.2022
  • Worked with SIEM tools IBM QRadar and LogRhythm to monitor security events, analyze vulnerabilities, and escalate incidents based on their severity
  • Conducted thorough log analysis and network traffic monitoring to identify anomalous behaviors and potential cybersecurity threats
  • Led incident investigation and response activities, ensuring proper containment, identification of the attack type, and remediation actions
  • Created detailed incident reports, dashboards, and security alerts to communicate incident status and mitigations to stakeholders
  • Participated in regular knowledge-sharing sessions to enhance team skills and improve incident handling efficiency
  • Developed and maintained operational procedures and best practices for vulnerability management and incident resolution

Salesforce Admin

Kozy Kreative Concepts
07.2018 - 07.2019
  • Involved in identifying, planning, and implementing new Salesforce.com features and functions, new screens, workflow, force.com objects, reports to meet business requirements
  • Developed various Custom Objects, Tabs, Components and Visual Force Pages and Controllers
  • Use of data-loader, data exporter and migrated the attachments from legacy CRM to Salesforce and worked on salesforce to salesforce
  • Involved in End-to-end testing and gathering requirements to feedback from business users
  • Used Sales Force Automation (SFA) for Sales Lead Management, Account and Contract Management and Approvals and Workflow
  • Implemented SFDC based products, including contract management, revenue and rebate management, and other related solutions
  • Developed and deployed workflows and approval processes for opportunities and products/ assets management
  • Developed Unit test class for Apex class and worked for improving code coverage
  • Used SOQL & SOSL with consideration to Governor Limits for data manipulation needs of the application using platform database objects
  • Involved in building the Customer Portal in the organization
  • Used Data Loader for insert, update, and bulk import or export of data from Salesforce.com subjects
  • Used it to read, extract and load data from comma separated values (CSV) files
  • Integrated Salesforce with Informatica on Demand for the proper mappings and extraction and transformation of data
  • Configured Chatter to track emails from Outlook to Salesforce by following a user
  • Worked with AppExchange Dup Catcher to filter and prevent duplicate records in the organization
  • Responsible for weekly and monthly data export, updates, and backup for the organization
  • Used Apex data loader to Inset, Update, and Import data from Microsoft Excel into Salesforce.com
  • Involved in Salesforce.com application setup activities and customized the apps to match the functional needs of the organization
  • Implemented the requirements on Salesforce.com platform and Force.com IDE Plug-in using Eclipse
  • Created and used Email templates in HTML 5
  • Environment: Salesforce.com, Visualforce, Salesforce.com Data Loader, Workflow & Approvals, Reports, Custom Objects, Custom Tabs, Page layouts, Email Services, SOQL, SOSL, Sandbox, Force.com IDE

Education

Bachelor of Science (B.S - Computer Science

Acharya N. G. Ranga Agricultural University
Baptatla, Andhara Pradesh, INDIA

Skills

Environmental Skills

  • SIEM Tools : LogRhythm, Splunk, IBM Q Radar, ArcSight

  • Vulnerability Assessment : Nessus Tool

  • EDR : SentinelOne, CrowdStrike, Microsoft Defender, Sophos EDR

  • Anti-Virus (EPO) : McAfee

  • Firewall : Forti Gate

  • Phishing Email : Mx Toolbox, IBMX-force, Virus Total

  • Email threat protection tools : Proofpoint, Ironscales(Knowlede)

  • System Security : Windows, Linux, Linux servers

Vulnerability assessment, Data encryption, Incident response management, Threat intelligence, Identity management, SIEM tools,Security frameworks, Network monitoring

Phishing detection, Access control, Endpoint protection, Web application security, Attention to detail, Security monitoring, Antivirus software proficiency, Cryptography knowledge

SIEM management, Compliance monitoring, IDS integration, User awareness training, Intrusion detection, Analytical thinking, Two-factor authentication, Security auditing, Cloud security, Wireshark software

DDoS mitigation, DDoS prevention, Log analysis, Data loss prevention, Risk management, Cyber threat analysis, Malware analysis, Cybersecurity frameworks,

Timeline

Cyber Security Analyst

Verizon
04.2023 - Current

Cyber Security Analyst

Kozy Kreative Concepts
08.2019 - 07.2022

Salesforce Admin

Kozy Kreative Concepts
07.2018 - 07.2019

Bachelor of Science (B.S - Computer Science

Acharya N. G. Ranga Agricultural University
Saisree KoripalliSOC Analyst