Professional Documents
Culture Documents
EMAIL: meruvavenkataramana338@gmail.com
MOBILE:
cpr100 8985309725
Objective:
Obtain a challenging and rewarding position as a SOC Analyst with organization that
recognizes my true potential and provides me sufficient avenues for professional and
personal growth through nurturing my technical skills.
Demonstrated experience for more than 4.9 years as a Security Analyst working in
information technology with areas involving wide range of Network Security devices
SIEM, IDS/IPS, EPP, WAF, Firewall, DDOS mitigation, tools and services industry.
Having strong business development.
Having hands on experience in network security, endpoint security, SIEM
technologies, incidence response, phishing analysis, Incident response, use case
implementation, guideline creation & reviewing and also familiar with web
technologies
Work History:
Company: SoftwareOne
Role: Security Analyst
Duration: April 2021-September 2021
Worked on technologies Trend Micro, cyber Ark, Cloud Security and Microsoft Azure.
Monitoring, analyze and investigating the incident on regular basis in M365 followed
by suspicious true positive alerts.
Analysing and investigating the true positive/false positive alerts.
Monitoring user signing activities in Microsoft Azure.
Monitoring the DLP and Email and web logs and NIS Malware, Spam mails &
investigate and escalate to the L2 and closing the incidents.
Creating the tickets in ticketing tool and updating the trackers once they are
resolved.
Worked on AXA GSOC (Global Security Operations Centre) is one of the largest SOC in
the world.
Following up continuous procedures and processes of Investigating Suspicious
Activities, Packet Analysis and correlation.
Project mainly focuses on various sites of security like Intrusion Prevention System,
Security information and Event management, Vulnerability management, Content
filtering. The project also involves DDOS mitigation at perimeter.
Analyzing Phishing and Spam related activities
Monitoring 24x7 for P1, P2, P3 alerts in SOC operations for real-time monitoring and
analyzing logs from various security/Industrial appliances by using QRadar.
Filling the Daily health checklist. Create, Modify and Update Security Information
Event Management (SIEM) Tools.
Creating Dashboard on QRadar to analyze the Data.
Creation of metrics and support KPI’s, Dashboard, Trackers and Analyzing daily,
weekly and monthly reports on DLP incident metrics update and close.
Escalation of incidents that are determined to meet a threshold for greater
investigation and review the DLP logs and close.
Carrying out log monitoring and incident analysis for various devices such as
Firewalls, IDS, IPS, database, web servers and so forth.
Strong capabilities in Microsoft products like Office’s Excel, Word, and PowerPoint.
Working knowledge on TCP/IP model and co-relating with real-life scenarios Good
communication and collaboration skills.
Good understanding of ITIL processes, including Change Management, Incident
Management and Problem Management Preferred.
Create, modify and tune the SIEM rules to adjust the specifications of alerts and
incidents.
Work with the customer designated personnel to provide continual correlation rule
tuning, incident classification and prioritization recommendations.
Report query adjustments, and various other SIEM configuration activities.
Assist customers to fully optimize the SIEM system capabilities as well as the audit
and logging features of the event log sources.
Work closely with the assigned Managed Services SIEM resources to ensure client's
customized solution is functioning optimally and continuously tuned to the client's
needs.
Resolve problems related to Network, Device, Policy, connectivity issues etc.
SIEM: Responsible for monitoring and event analysis in Qrader, Splunk Attack
identification, deep investigation of potential attack and compromised system
(firewall, IPS, Proxy, Antivirus and end System).
IDS/IPS: Monitored events, Log Analysis, verifying SNORT rule in packet analysis,
responded to incidents, reported findings of Blacklisting/Whitelisting of IP’s.
EPP: Checking the Computer status and risk logs for client on regular basis.
DDOS Mitigation: Monitor the Network level traffic, profiling over the network
traffic and establishing base value and threshold values.
Responsible for providing appropriate remediation solution to prevent attacks
before they can helps the client in Use case reviewing and providing feedback
accordingly.
Education:
B.Tech in Mechanical Engineering from K.S.R.M College of Engineering in 2010,
Kadapa.
Intermediate in M.P.C from New Vikram Jr College in 2006, Kadapa.
SSC in S.P.B.V.D Sabha High School in 2004, Upparapalli Village – Kadapa District
Declaration:
I hereby declare that the information furnished above is true.
Venkataramana Meruva