Sannala Harshavardhan Reddy
About Candidate
Having 3.2 years of experience in Information Security, with security operations including Incidentmanagement,
Endpoint security and logs analysis through SIEM.
Experience on working in 24×7 operations of SOC team, offering log monitoring, security information event
management.
Major Experience in Azure Sentinel and Microsoft defender.
Experience in Security incidents Monitoring and Operation.
Information and Event Management, Threat Monitoring.
Experience in creating the SOP Runbooksfor the alerts coming in dashboard.
Expertise in creating the WSR and DSR reports and sending regularly to the CISO and the team.
Performing security incident detection, detailed investigation of incidents and managing service level agreements
Providing L1 Support in resolving alerts generated by complex network, end point and log analysis performance.
Analyze the network traffic Firewall, IDS, IPS events, logs and evaluate effectiveness of existing security controls.
Performongoing monitoring and threat analysis,Analysislogs/traffic
Education
Work & Experience
Engaged in operational support for Microsoft Azure Sentinel across both the console and web interfaces,within the SecurityOperations Center in a MSSP project. Managing the full incident management framework lifecycle , including incident identification, containment, root cause analysis, recommendation and implementation of preventive and corrective measures, and conducting network analysis as required on a case-by-case basis. Participating in weekly and monthly review calls with Customer. Monitoring Microsoft Azure Sentinel dashboard to detect and respond to security incidents during scheduled shifts, promptly addressing critical events across all supported environments Managing security incident response and ensuring timely closure of incidents within SLA using ServiceNow Analyzing phishing and spam-related activities and promptly notifying users. Compiling daily and weekly dashboards on security threats. Will thoroughly document tickets with all actions taken for each incident, regularly update them, andensure ticket quality by including all necessary comments. Conducting real-time monitoring, investigation, analysis, reporting, and escalation of security eventsfrom multiple log sources Analyzing incidents to determine whether they are false or true positives. Troubleshooting SIEM dashboard issues when there are no reports getting generated or no data available. Proficient knowledge of OWASP Top 10, IDS, IPS, and cyber attacks such as DoS, DDoS, MITM, SQL injection, XSS, and CSRF. Facilitate security incident response processes during security breaches by providing incident reporting support.