ALLU VENKETTA JAYYANTH
About Candidate
Dedicated Security operational Center (SOC) Analyst with 3.5 years of hands on experience in Security operations Hands on Experience with Azure sentinel and Arc Sight for log monitoring and analyzing the logs. Hands on Experience with Microsoft 365 Defender for endpoint detection and response. I have good understanding of security solutions like Anti Virus , DLP, Proxy, Firewall, IDS/IPS, Email security , WAF etc Capable to execute KQL queries to Gnd logs and correlate with historical search results. I have Tood understanding of networking concepts Including OSI layer, Subnet, PC/NI/, /orts, DFS, DHC/, irewall,/roxy, Security concepts , Cyber kill chain, MITRE Att&CK etc, Eager to contribute expertise and continue learning in a challenging soc environment.W |
Education
Work & Experience
F Collaborate with internal teams inclining Fetwork and system administrators, to address security gaps and Implement security controls. F Stay up to date with the latest security threats end vulnerabilities. and proactively propose enhancements to the security infrastructure. F Tenerate and maintain detailed incident reports, including incident timeline, actions taken and lessons learned F Assist in developing and implementing SOC processes, procedures, and guidelines. Experience working with SIE3 solutions, IDSN I/S systems, and lag analysis tools. F amiliarity with incident response methodologies, including containment, eradication, and recovery. F -nderstanding of security frameworks and standards. such as FISP, and SAFS
• Mork on Azure sentinelN Connect wise Pickets on day to day basis and perform investigation remediation tasks. • Analyzing the logs using Azure Sentinel.W • Investigating suspicious activities, containing Wand preventing them. • Investigating and remediating incidents in 3icrosoft U65 security center. • Staying current with new use cases. • -pdating the ticketing tool system thoroughly and timely. • 3onitoring and analyzing the emails which are reported by users and categorizing those emails as 3alicious and nonRmalicious. • Quarantine the malicious emails by Gnding the patterns. • Paking the precautionary measures for users who clicked on phishing links. • /erforming the static and dynamic malware analysis. • Fotifying concern team for necessary actions.W • Creating the payloads using 3icrosoft Attack simulation training Wand launching on users to educate them on phishing emails. • working on daily, weekly, monthly :eports. • inding the alerts root cause and documenting all the information incidents and providing to Architecture and Engineer team. • Experience on Executing Kusto Query language(KQL).