Jayaram Pulakala
About Candidate
I am looking for a challenging job with a rapidly growing organization that can provide me with a range of goals and job objectives within a contemporary and economical business setting. Hardworking and passionate job seeker with strong organizational skills eager to secure entry-level SOC Analyst position. Ready to help team achieve company goals. |
Education
Work & Experience
Conduct log analysis using Splunk ES SIEM Tool /Azure Sentinel. Performing real-time Monitoring, Analyzing, and Investigating of logs with Reporting, Escalation and resolve of various Incidents/Events/Security Alerts triggered in SIEM tool from multiple log sources. Identify and ingest indicators of compromise (IOCs), e.g malicious IPs/URLs, e.g., into network tools/applications stay up to date with current vulnerabilities attacks. Utilize Firewall, Windows & Antivirus Logs to monitor malicious. Activities on the network, IPS/IDS logs to uncover malicious activity going on within network. Performing real-time Monitoring, Analyzing, and investigating the alerts with Reporting, Escalation and resolve of various EDR tools. Providing logs to different teams from Splunk ES as and when request for logs received. Working on multiple tools to perform a day-to-day task, like having Symantec AV, Sentinel One Response and Protect, Symantec DLP, and many more. . . Investigate all reported suspicious emails and determine whether the emails are malicious, non-malicious or legitimate and reply to the user who reported the suspicious email with a message reporting the findings and any recommendations.