Experienced SOC Analyst (L2) with 2.8+ years of hands-on expertise in incident response, threat hunting, and SIEM operations, having led successful SIEM migrations, fine-tuned alert rules while analyzing logs, investigating network traffic, and securing both cloud and on-prem infrastructures using tools like MS Sentinel, McAfee, Securonix, and Rapid7 EDR.
Overview
3
3
years of professional experience
Work History
Associate - Cyber Security Analyst (SOC L2)
Cybaltt (A BlackBox Company)
10.2021 - 12.2023
Company Overview: (Cybalt is a dedicated cybersecurity division under Black Box, formerly AGC Networks.)
Monitored network traffic for anomalous behavior, ensuring compliance with security policies and standards.
Investigated and triaged global SIEM and EDR alerts to detect, prioritize, and escalate potential threats, keeping 95% SLA adherence with zero critical misses.
Conducted malware analysis, system forensics, and log deep-dives (Windows, VPN, AD, email headers) to identify indicators of compromise and attacker TTPs.
Participated in enterprise-wide threat hunts across endpoints and cloud workloads, applying MITRE ATT&CK and threat intelligence to uncover stealthy intrusions.
Supported containment, eradication, and remediation efforts during confirmed incidents, documenting findings and advising cross-functional remediation teams.
Migrated McAfee SIEM to Securonix with seamless integration of 50+ global log sources, boosting log fidelity and response agility in multi-tenant environments.
Tuned detection content and refined use case logic to improve SOC alert quality by 20%, reducing analyst fatigue and improving MTTD/MTTR metrics.
Delivered weekend and holiday shift support during high-priority incidents, maintaining 24/7 incident response continuity in line with global operations.
Cyber Security Analyst (SOC L1)
Black Box Limited (Formerly AGC Networks Ltd)
04.2021 - 10.2021
Company Overview: (Promoted internally to Blackbox following establishment of dedicated cybersecurity division from AGC Networks.)
Investigated 200+ weekly alerts across SIEM and EDR platforms, escalating confirmed incidents as per SOC standard procedures.
Contributed to threat detection improvements by finding gaps in telemetry and refining alert logic based on adversary TTPs.
Collaborated with client security teams during high-severity incidents, delivering actionable recommendations and status updates.
Authored and maintained parsing logic, playbooks, and ticket documentation for incident response to ensure consistency and compliance.
Education
Master of Science - Cybersecurity
Dublin Business School
Dublin, L
01.2025
Bachelor of Science - Electronic and Telecommunication
Lokmanya Tilak College of Engineering
Mumbai, India
01.2020
Skills
Core Domains: Cybersecurity, Information Security, Information Technology, Cyber Threat Intelligence (CTI), Vulnerability Management, Network Security, Log Analysis, Content Management
Security Operations: Incident Response (PICERL), Security Monitoring, SIEM (Securonix, McAfee, Microsoft Sentinel and Rapid7 EDR), SOAR Integration (Playbook), Threat Hunting, Log Correlation, IOC & TTP Analysis
Platforms & Tools: Windows Server, Linux, VMware, Active Directory, Azure AD, Fortinet, CrowdStrike, Microsoft Defender, Darktrace