Report Abuse

Candidate Information

Full Name
Prathamesh vishnu
Age
25
Education
Bachlour degree
Experience
3.5
Job Type
Full-time

Contact Details

Address
pune
State
Telangana
Country
India

About candidate

About you
Proactive SOC Analyst with over 4 years of experience in cybersecurity operations,
specializing in monitoring, detection, and mitigation of advanced cyber threats.
Proficient in using cutting-edge tools like Splunk SIEM, Azure Sentinel, SentinelOne
EDR/XDR, and Microsoft Defender solutions. Expertise in analyzing firewall, proxy,
and IDS/IPS logs to identify threats such as lateral movement, command and
control (C2) traffic, and persistence techniques. Adept at improving security
posture through meticulous investigation and incident response
What are you looking for in a new role?
new skill devloping, gain new knowldge
What you are interested in working with us?
yes
What has been most challenging experience in a past role?
Proactive SOC Analyst with over 4 years of experience in cybersecurity operations,
specializing in monitoring, detection, and mitigation of advanced cyber threats.
Proficient in using cutting-edge tools like Splunk SIEM, Azure Sentinel, SentinelOne
EDR/XDR, and Microsoft Defender solutions. Expertise in analyzing firewall, proxy,
and IDS/IPS logs to identify threats such as lateral movement, command and
control (C2) traffic, and persistence techniques. Adept at improving security
posture through meticulous investigation and incident response

Cover latter

Monitor and analyze security events using Splunk SIEM to detect potential
threats.







Investigate and respond to endpoint incidents using SentinelOne EDR/XDR
and Microsoft Defender for Endpoints.
Analyze firewall, proxy, and IDS/IPS logs to identify anomalous activities,
including lateral movement and persistence attempts.
Detect and mitigate command and control (C2) traffic by correlating logs and
leveraging threat intelligence.
Conduct root cause analysis for security incidents and implement measures to
prevent recurrence.
Collaborate with IT and network teams to strengthen security posture and
minimize vulnerabilities.
Analyzed PowerShell-related alerts, new process creation, and unauthorized
lateral movement attempts.
Investigate traffic patterns in firewall logs to identify unauthorized
access, port scans, and unexpected data exfiltration attempts