About
Highly motivated Cybersecurity Analyst with comprehensive hands-on SOC experience in incident monitoring, vulnerability management, and phishing analysis. Proven ability to significantly improve security operations, evidenced by a 35% increase in incident detection efficiency within 6 months through SIEM tuning and SOAR automation. Proficient in Microsoft 365, Active Directory, cloud platforms (AWS, Azure), Python, and Bash, with a strong foundation in threat detection, incident response, and compliance.
Work
Remote, N/A, US
→
Summary
Managed end-to-end incident response for diverse clients, optimizing security operations and reducing critical response times.
Highlights
Acted as first point of contact for incidents, triaged over 200 cases end-to-end, reducing Mean Time to Resolution (MTTR) by 25% within 6 months under SLA.
Built and optimized SIEM dashboards with advanced correlation analysis, decreasing false positives by 30% within 4 months.
Hardened Linux, CentOS, and Windows Servers, enhancing compliance posture and mitigating risks by 40% within 4 months.
Leveraged Python and Bash scripting to automate security tasks, significantly enhancing threat detection and response capabilities.
Ahmedabad, Gujarat, India
→
Summary
Developed and implemented robust cybersecurity measures, significantly enhancing detection accuracy and reducing unauthorized access incidents.
Highlights
Automated log parsing workflows using Python and Bash scripting, boosting detection accuracy by 50% within 6 months.
Advised on IAM authentications and user accounts, resulting in a 30% reduction in unauthorized access incidents within 4 months.
Implemented robust cyber security measures and data protection strategies, ensuring sensitive data integrity and system security across the organization.
Skills
Compliance & Governance
Governance & Compliance, PIPEDA/PIPA.
Cybersecurity Operations
Incident Response, SIEM Monitoring, SOAR Playbooks, Triage & Escalation, Vulnerability Scanning, Malware Analysis, UEBA, Patch Management, Case Management, Runbooks & Procedures, Troubleshooting.
Security Tools & Platforms
CrowdStrike, EDR, Defender ATP, Wazuh, TheHive, Shuffle, Microsoft 365 (m365), Active Directory.
Cloud Security
AWS, Azure.
Programming & Scripting
Python, Bash Scripting.
Networking
TCP/IP & Network Protocols (FTP, DNS, DHCP, SMTP, Telnet), Network Protocol Analysis.
Methodologies & Frameworks
MITRE ATT&CK Framework, Correlation Analysis, Process Improvement, Analytical Thinking.
Operating Systems
Linux, CentOS, Windows Servers, Mac OS.