G Siva Sai
About Candidate
3.6 Years of Hands-on Experience in securing the network environment using SIEMtools like
Qradar and Splunk.
Experience on security operations, incident management, intrusion detection, and security event
analysis through Qradar & Splunk SIEMs.
Experience in Monitoring & Investigating incoming Events inQradar and Splunk.
Experience working in 24×7 operations ofthe SOC team, offering log monitoring, security
information management, and global threat monitoring.
Good understanding of log formats of various devices such as Vulnerability Management Products,
IDS/IPS, Firewalls, Routers, Switches, OS, DB Servers, and Antivirus.
Experience in generating Daily, Weekly & Monthly Reports fromQradar and Splunk.
Exposure to Ticketing tools like Service Now.
Strong knowledge ofthe Event Life Cycle and its Phases.
Strong knowledge ofIncident management life cycle.
Familiar with Networking Concepts.
Good communication, problem-solving skills, and the ability to acquire new skills in a timely manner.
Abilityto build successfulrapport with coworkers, employees, and Clients.
Conduct a thorough investigation ofsecurity events generated byour detection mechanisms such as
SIEM, IDS/IPS, and AV.
Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
Recognize potential, successful, and unsuccessful intrusion attempts and compromise thorough
reviews and analyses of relevant event detail and summary information.
Evaluate firewall change requests and assess organizational risk.
Identifying and investigating/resolving data exfiltration and phishing event
ement.