K Daniel Raju
About Candidate
Having 3.2 years of experience as a SOC Analyst and SIEM Tools like Splunk & IBM QRadar
- Experience in EDR Tool like Microsoft Defender 365
- Experience in CRM and Service Now Tools.
- Experience in analysing Malware, Phishing & Spoofed Emails
- Familiar with Vulnerability Assessment using Nessus Tool
- Strong understanding of Incident Life Cycle, Cyber-kill chain, CIA triad.
- Good understanding on phase of attack and type of attack like Brute force attack, DOS attack, DDOS attack,
SQL injection, phishing attack, spoofing attack. - Sound knowledge of Network Security, OSI Layers, TCP/IP Ports and Protocols
- Familiar with security tools like Abuse IPDB, Virus Total, IBM X force exchange, Ultimate Windows security,
Mxtoolbox, and IPvoid - Good understanding of Data Loss Prevention (DLP) implementation.
- SOC Operations environment including alerts/log analysis and finding true positive..
- Investigation of security alerts in order to determine suspicious and False Positive.
- Conduct initial triage, declare events/incidents, create incident cases & gather evidence.
- Investigating incidents, remediation, tracking and follow-up for incident closure with concerned teams,
stakeholders. - Real time log analysis from different network devices such as firewalls, IDS, IPS, Operating systems like
windows, system application, and networking devices. Maintain up-to-date documentation of SOP’s, update
tracker & incident follow up tracker. - Providing 24*7 support and coordinating with required team to resolve the issues.
- Responsible for end-to-end event/incident management and driving the incident response function within
SLA. - Log and assign incident tickets for internal and external users for various product related issues and coordinate with the respective teams for closure of the incidents under the defined SLA and priority
Education
B
Bachelor of Technology in Mechanical Engineering
JNTUH
Work & Experience
S
Senior Associate
May 2021 - August 2024
Wipro Ltd