DHANANJAY CHOURASIYA

About Candidate

Education

B
BACHELOR OF ENGINEERING (B.E) JUNE 2019
Oriental Institute of Science and Technology, Bhopal

 Branch: Information Technology  Ethical hacking, entrepreneurship cell of IIT Kharagpur, 2018

Work & Experience

S
SOC ANALYST MARCH 2022 - MAY 2023
WIPRO LIMITED

 Conducted proactive monitoring and analysis of network traffic around the clock, utilizing advanced tools to swiftly detect and respond to potential threats.  Analyzed security incidents, performed intrusion detection, and identified root causes through thorough investigation of log data.  Utilized Splunk SIEM for IDS monitoring and analysis, ensuring efficient threat detection and response.  Conducted detailed analysis of phishing emails and logs using Splunk, enhancing defenses against email-based threats.  Ensured comprehensive IOC searches through EDR tools, enhancing threat detection capabilities.  Implemented automated tools for continuous monitoring of system logs, reducing manual efforts and enhancing efficiency.  Generated vulnerability assessment reports using Nessus, providing actionable insights for improving security posture.  Managed incident tickets and effectively handled false positives, minimizing disruptions while maintaining a high level of security.  Maintained accurate documentation of all SOC activities, facilitating knowledge sharing across the organization.  Delivered end-user education on security best practices, empowering employees to recognize and respond to potential threats effectively.  Collaborated with L2 and L3 analysts for incident escalation, ensuring timely resolution of complex security issues.  Enhanced network security by monitoring systems for potential threats and vulnerabilities.  Provided technical support during high-priority incidents, ensuring timely resolution with minimal impact on business operations.  Reduced false alarms by fine-tuning intrusion detection system configurations based on historical incident analysis.  Investigated and resolved incidents of unauthorized access to sensitive information.  Drafted security reports and metrics to track security performance and strategize improvements.

Be the first to review “DHANANJAY CHOURASIYA”