Ranjth Resume-SOC
Ranjth Resume-SOC
Experienced Security operations Center Analyst with a demonstrated history of working in Incident
Response and Threat Hunting. Skilled in investigating Security Incidents and coordinating with teams to
contain a compromise situation, finding root cause for incidents, making/suggesting changes to improve
Security measures in an organization.
Work Experience:
Currently working as SOC Analyst with 3.2 years in Tech Mahindra from April 2018 –
Present.
Worked as a Graduate Apprentice Trainee with 1 year in Avantel Limited from March 2017
to March 2018.
Skills:
Professional Summary:
● Served as Analyst in SOC operations for real-time monitoring, analyzing logs from various
security/Industrial appliances.
● Experienced in using SIEM tools Qradar and Splunk for analyzing logs from Network Devices,
Authentication Devices, Endpoints, Email Gateway and other cloud hosted devices.
● Analyse and investigate the alerts in SOC monitoring tool to report any abnormal behaviors,
suspicious activities, traffic anomalies etc.
● Handling DLP and Data exfiltration incidents and closing them with appropriate categorization for
different policies
● Knowledge of email security threats and security controls, including experience on analyzing email
headers, Attachments and URL’s.
● Responsible for analyzing suspicious email URL’s or attachments using sandboxes and
communicate with concerned teams to block the URL at gateway level of Proofpoint.
● Determining IOC’s while threat hunting by correlating and analysing a variety of application,
network and host-based security logs and determining the correct remediation actions and escalation
paths for each incident.
● Carrying out log monitoring and incident analysis for various devices such as Firewalls, IDS, IPS,
database, web servers and so forth.
● Security event analysis and intrusion detection by review and analysis of events generated by
various components including IDS/IPS, firewalls, Routers, DB, OS, and various types of security
devices.
● Work closely with business units to ensure that they know what and how to feed data into Qradar
and to create network hierarchy, classify Log Sources within the Qradar SIEM.
● Maintain keen understanding of evolving internet threats to ensure the security of client networks.
● Escalating the security incidents based on the client's SLA and providing meaningful information
related to security incidents by doing in-depth analysis of event payload, providing
recommendations regarding security incidents mitigation which in turn makes the customer business
safe and secure.
● Actively involved in monitoring and remediating alerts Working with IT functional teams until the
infected machine is remediated.
● Website Anti-Malware and Defacement monitoring and real-time alerting based on anomalies
detected.
● Differentiate the false positives from true intrusion attempts and help remediate / prevent.
● Work with the customer designated personnel to provide continual correlation rule tuning, incident
classification and prioritization recommendations.
● Quick response and to interpret security incidents and to provide root cause analysis.
● Respond to common alerts in a consistent and repeatable manner from multiple sources.
● Actively investigates the latest security vulnerabilities, advisories, incidents, and notifies clients
when appropriate.
● Security Alerts and targeted phishing sites by using SIEM tool with the help of technologies such as
Watermark, Referrer, Abuse mailbox and similar sounding domains.
● Performing enterprise-wide Vulnerability Assessment campaign and ensure timely remediation of
identified vulnerability. Perform trend analysis to capture and highlight repetitive critical
vulnerabilities in environment.
Education:
I hereby declare that the information furnished above is true to the best of my knowledge.
Date :
Signature : Ranjith Kumar