Security Operations Center Associate
Hands-on SOC practitioner with Splunk Enterprise SIEM experience, Tier 1 alert triage, log analysis, and IOC identification. Skilled in MITRE ATT&CK TTP mapping and SOC playbook-aligned incident documentation. Available for 24/7 shift operations.
// 01 — Experience
// 02 — Skills
// 03 — Projects
Deployed a centralised log forwarding pipeline using Splunk Universal Forwarder to ingest Windows and Linux endpoint telemetry into Splunk Enterprise SIEM. Tuned correlation rules and detection logic to reduce false positives and improve alert accuracy.
Executed controlled attack simulations — brute-force, phishing, and malware execution scenarios — to validate alert generation and detection workflows. Mapped attacker behaviour to MITRE ATT&CK tactics, techniques, and procedures.
Investigated SIEM-generated alerts, analysed related activity logs, identified IOCs, and followed defined escalation and documentation workflows aligned with SOC operational standards and SOPs.
Active across TryHackMe, defenders.io, and Blue Team Labs Online (BTLO) — practising alert triage, digital forensics, log investigation, and defensive security challenges in realistic SOC-like scenarios.
// 04 — Certifications
// 05 — Education
Postgraduate specialisation in cyber security — network defence, incident response, and advanced security operations.
Specialisation in Cyber Security — ethical hacking, network security, operating systems, and information security principles.
// 06 — Contact
Open to SOC Analyst (L1) opportunities — on-site, hybrid, or remote. Available for 24/7 shift operations including nights, weekends, and on-call rotations. Languages: English, Malayalam.