Shriniwas Tatte

DevOps Manager

Pune, Maharashtra, India1 yr 11 mos experience
Highly Stable

Key Highlights

  • Expert in SIEM systems and security monitoring.
  • Proficient in incident response and threat hunting.
  • Skilled in analyzing network traffic and security events.
Stackforce AI infers this person is a Cybersecurity Analyst with expertise in threat detection and incident response.

Contact

Skills

Core Skills

Incident ResponseThreat Hunting

Other Skills

Digital ForensicsEndpoint SecurityIOC ManagementMalware AnalysisNetwork Traffic AnalysisReport CompilationSIEM MonitoringSecurity Event Analysis

About

Responsible for monitoring, analyzing, and maintaining SIEM systems, including generating reports and responding to security alerts. Conducts detailed analysis of network traffic and host activity, supports incident response efforts, and engages in threat hunting. Compiles investigation reports, evaluates security technologies, and continuously improves security processes. Manages indicators of compromise (IOCs) and analyzes various security logs to identify and mitigate threats.

Experience

Tata consultancy services

2 roles

Security Analyst

Aug 2022Jul 2024 · 1 yr 11 mos · On-site

  • SIEM Monitoring and Analysis: Oversee general SIEM monitoring, analysis, and maintenance, including the delivery of comprehensive reports.
  • Alert Management: Conduct research, analysis, and response for security alerts, including log retrieval, analysis, and thorough documentation.
  • Network Traffic and Host Activity Analysis: Perform detailed analysis of network traffic and host activity across various technologies and platforms.
  • Incident Response Support: Assist in incident response activities, including host triage, malware analysis, end-user interviews, and remediation efforts.
  • Report Compilation: Compile detailed investigation and analysis reports for internal SOC use and
  • delivery to management.
  • Security Event Analysis: Analyze network traffic, IDS/IPS/DLP events, packet captures, and firewall logs
  • to identify potential threats.
  • Malicious Campaign Analysis: Evaluate and analyze malicious campaigns to assess the effectiveness of
  • security technologies.
  • Threat Hunting: Coordinate and conduct threat hunting activities using intelligence from both internal
  • and external sources.
  • Threat Actor Identification: Identify and track threat actor groups, along with their techniques, tools, and
  • procedures.
  • Process Improvement: Continuously improve processes for enhanced efficiency across multiple detection
  • sets in Security Operations.
  • Alert Review and Adjustment: Review detection infrastructure alerts for false positives, making necessary
  • adjustments to optimize alert accuracy.
  • IOC Management: Collect, analyze, investigate, store, and disseminate indicators of compromise (IOCs).
  • Comprehensive Analysis: Provide in-depth analysis of network packet captures, DNS, proxy, NetFlow,
  • malware, host-based security, and application logs, as well as logs from various security sensors.
SIEM MonitoringIncident ResponseNetwork Traffic AnalysisMalware AnalysisThreat HuntingReport Compilation+2

System Engineer

Aug 2022Jul 2024 · 1 yr 11 mos · On-site

Education

Suryadatta Institute of Business Management & Technology (SIBMT)

Master of Computer Applications - MCA — Computer Science

Sep 2022Nov 2024

Sangmeshwar collage

Bsc(ECS) — Computer Science

Jan 2019Jan 2022

Stackforce found 100+ more professionals with Incident Response & Threat Hunting

Explore similar profiles based on matching skills and experience