Experienced IT professional with 5+ years of industry expertise, including 4.5 years as a SOC Analyst in fast-paced 24x7 SOC environments and 1 year as a Salesforce Administrator. Specialized in Security Operations Center (SOC) methodologies, excelling in incident handling, threat detection, log analysis, network traffic monitoring, and real-time event handling. Proficient in utilizing SIEM tools such as IBM QRadar, LogRhythm, Splunk, and LogRythm for monitoring, analyzing, and responding to cyber threats. Skilled in identifying, analyzing, and mitigating risks associated with cybersecurity breaches and vulnerabilities across network and application layers. Extensive hands-on experience with EDR tools (e.g., CrowdStrike, Microsoft Defender for Endpoint) and email threat protection tools (e.g., Proofpoint, Ironscales), as well as performing PCAP analysis and sandbox analysis to identify malicious activities. Strong knowledge of Intrusion Detection Systems (IDS), TCP/IP analysis, network protocols (HTTP), and operating systems (Windows/UNIX). Proven track record of creating detailed reports, conducting vulnerability assessments, and developing security policies aligned with organizational security goals. Effective communicator with exceptional relationship management and collaborative skills within cross-functional team environments. Developed critical cybersecurity skills in high-stakes settings, focusing on threat detection and risk mitigation. Transitioning into a new field to leverage expertise in analyzing security vulnerabilities and implementing safeguards. Committed to applying analytical and problem-solving abilities to protect and enhance organizational information security.
Environmental Skills
Vulnerability assessment, Data encryption, Incident response management, Threat intelligence, Identity management, SIEM tools,Security frameworks, Network monitoring
Phishing detection, Access control, Endpoint protection, Web application security, Attention to detail, Security monitoring, Antivirus software proficiency, Cryptography knowledge
SIEM management, Compliance monitoring, IDS integration, User awareness training, Intrusion detection, Analytical thinking, Two-factor authentication, Security auditing, Cloud security, Wireshark software
DDoS mitigation, DDoS prevention, Log analysis, Data loss prevention, Risk management, Cyber threat analysis, Malware analysis, Cybersecurity frameworks,