Kumar Gaurav

Associate Consultant

Gurugram, Haryana, India3 yrs 2 mos experience
Most Likely To SwitchHighly Stable

Key Highlights

  • Over 2 years of SOC experience in incident handling.
  • Proficient in Microsoft Sentinel and KQL for security analysis.
  • Expertise in client-focused reporting and actionable insights.
Stackforce AI infers this person is a Cybersecurity Analyst with strong skills in incident response and security monitoring.

Contact

Skills

Core Skills

Incident ResponseSecurity Information And Event Management (siem)Incident Investigation

Other Skills

BootstrapCascading Style Sheets (CSS)Cyber Threat Intelligence (CTI)CybersecurityForensic AnalysisHTMLJavaScriptLeadershipMicrosoft ExcelMicrosoft SentinelPresentationsProblem SolvingReact.jsTeam LeadershipXDR Solutions

About

Experienced SOC Professional: Over 2 years of hands-on experience in Security Operations Center (SOC) environments, specializing in incident handling, response, and investigation. Microsoft Sentinel Expertise: Proficient in Microsoft Sentinel and skilled in Kusto Query Language (KQL), leveraging these tools for comprehensive security monitoring and analysis. Programming Proficiency: Well-versed in programming languages including JavaScript, HTML, and React, facilitating effective data analysis and visualization. SLA Calculation Experience: Extensive experience in IT audit SLA calculation, ensuring compliance and efficiency in service level agreements. Client-Focused Reporting: Expertise in creating tailored weekly reports for clients, delivering actionable insights and recommendations. Continuous Improvement: Committed to staying updated on industry trends and technologies to enhance security operations and mitigate risks effectively.

Experience

Pwc india

3 roles

Associate

Promoted

Apr 2025Present · 11 mos · Gurugram, Haryana, India

  • As a Security Operations Center (SOC) Analyst, I specialize in threat detection, analysis, and response. My core responsibilities include:
  • Real-time monitoring and triage of security alerts via leading SIEM tool microsoft sentinel.
  • Conducting deep-dive investigations and forensic analysis of suspicious activity using XDR solutions.
  • Correlating security events across endpoints, networks, and cloud environments to identify potential threats.
  • Generating incident reports, escalating critical events, and collaborating with incident response teams.
  • Proactively tuning detection rules and improving the alerting logic to reduce false positives and enhance detection accuracy.
  • Supporting compliance and audit requirements by maintaining logs and evidence trails.
Incident InvestigationIncident ResponseSecurity Information and Event Management (SIEM)Microsoft SentinelCyber Threat Intelligence (CTI)

SOC Analyst

Jan 2023Present · 3 yrs 2 mos · Gurugram, Haryana, India

Risk Consultant

Jan 2023Nov 2024 · 1 yr 10 mos · Gurugram, Haryana, India

Education

Gandhi Institute of engineering and technology

Bachelor of Technology - BTech — Instrumentation Engineer

Jan 2012Jan 2016

Masai

Full Stack Web Development

Nov 2021Jul 2022

CHATRA COLLEGE, CHATRA

Intermediate — Science

Jan 2010Jan 2012

I T S V M high school ,Chatra

Matric

Jan 2009Present

Stackforce found 100+ more professionals with Incident Response & Security Information And Event Management (siem)

Explore similar profiles based on matching skills and experience