Summary
Overview
Work History
Education
Skills
TOOLS
Websites
Certification
KEY ACHIEVEMENTS
Timeline
Generic

Karthik S

SOC Analyst (Tier 2) | Incident Response | SIEM | Blue Team
Davangere

Summary

SOC Analyst with 2+ years of hands-on experience in 24x7 Security Operations Center (SOC) environments specializing in SIEM monitoring, incident response, threat detection, and alert triage.

Skilled in investigating P1/P2 security incidents, performing root cause analysis, and reducing false positives through use-case tuning. Experienced with MITRE ATT&CK, malware analysis, and SIEM tools (Splunk ES, IBM QRadar, Google Chronicle).

Overview

2
2
years of professional experience
3
3
Certifications

Work History

SOC Analyst

Starlite Infotech Limited
Bengaluru
09.2023 - Current
  • Conducted real-time analysis of security alerts using Splunk ES and QRadar, handling P1/P2 Incidents.
  • Analyze threats by taking the events from Firewalls, Endpoints, Servers, IDS/IPS etc.and identify a false positive and a true positive.
  • Performed root cause analysis and coordinated containment and recovery actions.
  • Followed the Incident Response lifecycle: Detection, Analysis, Containment, Eradication, and Recovery during security incident handling.
  • Reduced false positives by 30% through effective use-case tuning.
  • Investigated malware infections, phishing attacks, and suspicious activities.
  • Generated incident reports and briefed shift lead and management.
  • Monitoring logs and investigating suspicious activities using SIEM tool Splunk by following runbook and using various Threat-Intel tools.
  • Providing a list of required actions when analysis confirms malicious, suspicious, oractionable incidents.
  • Blocking Malicious URL on proxy tools.
  • Engagement in daily Client Calls

Education

Bachelor of Engineering (B.E) - Chemical Engineering

Bapuji Institute of Engineering And Technology
05-2023

Skills

  • SOC Operations (Tier 2)
  • Incident Response Analysis
  • Incident Response & Root Cause Analysis
  • SIEM Monitoring & Log Analysis
  • Containment & Eradication
  • Malware & Phishing Analysis
  • MITRE ATTACK Framework
  • Endpoint Detection & Response (EDR)
  • Threat Intelligence & Reporting
  • Ticketing Tools – Jira, ServiceNow

TOOLS

  • SIEM: Splunk ES, IBM QRadar, Google Chronicle
  • EDR: CrowdStrike, SentinelOne, Microsoft Defender
  • Network Security: Fortinet, Firewalls, IDS/IPS, WAF
  • Threat Intelligence: VirusTotal, AbuseIPDB, URLScan, AlienVault OTX
  • Frameworks: MITRE ATT&CK, Cyber Kill Chain, OWASP Top 10
  • Logs: Windows Event Logs, Logon Types
  • Security Concepts: CIA Triad, DoS/DDoS, XSS, SQL Injection, Phishing, Malware

Certification

MITRE ATT&CK – Foundation Level

KEY ACHIEVEMENTS

  • Resolved multiple high-severity incidents with minimal escalation.
  • Enhanced alert accuracy and response times.
  • Supported shift transitions and peak alert periods.

Timeline

SOC Analyst

Starlite Infotech Limited
09.2023 - Current

Bachelor of Engineering (B.E) - Chemical Engineering

Bapuji Institute of Engineering And Technology
Karthik S SOC Analyst (Tier 2) | Incident Response | SIEM | Blue Team