Amith Kumar
Amith Kumar
Soc Analyst
[email protected] 8919751277 hyderabad, india
PROFILE
Experienced IT professional with 8 plus years of overall experience, in which 3.10 years of experience in Security
Operations Centre (SOC) and 4.3 years in Technical support. Have gained strong knowledge on various tools like
Splunk, Qradar, Proofpoint, Crowd strike. My greatest strengths are understanding business risks to enable
deployment of efficient security systems. Enthusiastic to take exciting opportunities in a dynamic environment
to further both my passion and organization's interest.
SKILLS
Log Analysis, SIEM, Endpoint Security, Vulnerability Assessment, Intrusion Detection, Incident
Response Management.
Tools & Technologies
· SIEM: Azure Sentinel and Splunk, ArcSight
· EDR: CrowdStrike
· Email Analysis: Microsoft defender.
· IDS/IPS: Source fire, MacAfee.
· Phishing Analysis: Proofpoint, Microsoft defender, MX tool box
· Network security: Fire eye, Wireshark
· Ticketing tools: ServiceNow,
· Vulnerability Management Detection and Response: Nessus.
· Endpoint Security Management Plat- form: Tanium-EDR
PROFESSIONAL EXPERIENCE
01/2021 – present Soc Analyst
Benguluru, India Mindtree
• Maintained accurate documentation of all SOC activities, facilitating knowledge
sharing across the organization.
• Reduced false alarms by fine-tuning intrusion detection system configurations
based on historical analysis of incidents.
• Enhanced network security by monitoring systems for potential threats and
vulnerabilities.
• Implemented automated tools for continuous monitoring of system logs, reducing
manual efforts by the team.
• Collaborated with IT teams to implement effective security measures, safeguarding
critical data and systems.
•
Identified root causes of security breaches through thorough investigation and analys
is of log data.
• Improved incident management workflows through streamlined communication
between SOC Analysts, IT departments, and other relevant parties.
• Streamlined incident response processes for quicker threat detection and
remediation.
• Promoted a culture of security awareness through regular training sessions,
presentations, and workshops for employees at all levels.
• Conducted comprehensive security assessments to identify risks and recommend
mitigation strategies.
• Provided expert guidance on cybersecurity trends and emerging threats to internal
stakeholders for informed decision making.
• Improved system security by configuring firewalls and intrusion detection systems.
• Initiated regular penetration testing to evaluate effectiveness of security measures.
• Guided junior analysts in investigation of complex security incidents, fostering
culture of learning and development.
• Updated security procedures and documentation, keeping pace with evolving cyber
threats and industry best practices.
• Monitored real-time security alerts to identify potential threats, significantly
reducing incident response times.
• Evaluated new cybersecurity solutions through rigorous testing procedures,
recommending the most appropriate technologies based on specific requirements
and budget constraints.
• Trained junior analysts in threat intelligence gathering techniques, improving
overall team efficiency.
Supportedcomplianceinitiativesbyconductingregularauditsofsecuritycontrolsandprov
idingrecommendationsforimprovement.
09/2016 – 12/2020 Technical support engineer
Hyderabad, India Cognizant Technology Solutions,
• Provided remote assistance to clients, ensuring timely resolution of software and
hardware concerns.
• Mentored junior members of the team on best practices in issue resolution
techniques.
• Served as an escalation point for challenging technical inquiries, demonstrating
expertise in product knowledge and problem-solving abilities.
• Conducted root cause analysis of technical issues, implementing preventive
measures for future occurrences.
• Enhanced customer satisfaction by resolving complex technical issues promptly
and effectively.
• Maintained clear communication channels with clients throughout the
troubleshooting process, ensuring transparency and trust.
• Explained technical information in clear terms to promote better understanding
for non-technical users.
• Responded to support requests from end-users and patiently walked individuals
through basic troubleshooting tasks.
• Documented faults and bugs for referral to development staff for use in updates.
• Performed root cause analysis of reported issues to enact corrections.
• Developed comprehensive troubleshooting guides for internal use, improving team
knowledge and performance.
• Earned recognition from management for consistently delivering exceptional
service quality.
• Managed multiple concurrent support cases with precision and focus, resulting in a
high rate of case closure within target timelines.
CERTIFICATES
Google Cybersecurity Certificates
. Foundations of Cybersecurity
. Play It Safe: Manage Security Risks
. Connect and Protect: Networks and Network Security
. Tools of the Trade: Linux and SQL
. Assets, Threats, and Vulnerabilities
. Sound the Alarm: Detection and Response
. Automate Cybersecurity Tasks with Python
. Put It to Work: Prepare for Cybesecurity Jobs
EDUCATION
12/2012 Electrical and Electronics Engineering
Hyderabad, India Osmania University