Dinesh Satya
About Candidate
Experienced SOC Analyst with 2.3 years of dedicated practice in cybersecurity operations. Proficient in utilizing SIEM monitoring, endpoint security, and incident response techniques to swiftly detect, analyze, and qualify cyber threats. Adept at identifying attack sources and targets, guiding ISS teams, and enforcing security measures for workstations, servers, and networks |
Education
Work & Experience
• Monitored and analyzed cyber security events utilizing QRadar (SIEM), IDS, Cylance, RedCloak, McAfee antivirus, and other relevant tools to ensure prompt threat detection and response. • Executed SOC procedures, ensuring seamless operations and adherence to established protocols. • Analyzed phishing emails reported by internal end users, identifying potential threats and taking necessary actions. • Escalated complex incidents to the L2 SOC team, facilitating efficient incident management and resolution. • Followed up on remediation activities, collaborating with relevant teams to ensure thorough mitigation of identified risks. • Conducted triage on general information security tickets, addressing inquiries and issues as needed. • Investigated security breaches and other cybersecurity incidents, uncovering the root causes and impact. • Documented security breaches, assessing the extent of damage caused, and contributing to post-incident analysis. • Maintained comprehensive documentation of work activities, using ticketing systems, operational briefs, and status reports to effectively communicate actions taken and outcomes achieved. • Owned security incident tickets, ensuring follow-up until closure, and providing guidance to Level 1 analysts in analyzing events and executing response activities. • Coordinated with cross-functional teams for cyber incident response and remediation activities. • Communicated effectively with stakeholders to meet SLAs and contractual requirements. • Prepared daily, weekly, and monthly dashboard reports, sharing insights with relevant stakeholders. • Kept current with the latest trends in attack patterns and tools through continuous learning