Karthikeyan R

DevOps Manager

Bengaluru, Karnataka, India11 mos experience

Key Highlights

  • Proficient in SIEM tools for real-time security monitoring.
  • Hands-on experience in incident response and threat hunting.
  • Strong foundation in cybersecurity principles and practices.
Stackforce AI infers this person is a Cybersecurity Analyst with a focus on incident response and threat detection.

Contact

Skills

Core Skills

Security Information And Event Management (siem)Incident ResponseCyber Threat Hunting (cth)Data Loss Prevention (dlp)

Other Skills

WazuhCrowdstrike FalconSeceonSplunkBMSJiraOSINT toolsThreat huntingDLPNetworkingNetwrixISO27001Cyber Threat Intelligence (CTI)Security Incident ResponseTeamwork

About

👨‍💻 About Me 🔗 Portfolio: https://0ff3nder404.netlify.app/ 💙 Blue by choice, Red by curiosity. ❤️ “A defender with an attacker’s mindset.” I’m your friendly neighbourhood Blue Teamer, working frontline on 24/7 rotational shifts. My day-to-day revolves around: ⦁ Monitoring & analyzing security events ⦁ Triaging alerts and closing tickets efficiently ⦁ Performing incident response & root-cause analysis ⦁ Writing clear reports ⦁ Creating correlation rules and contributing to automation ⦁ Learning from senior analysts to build practical use cases & playbooks Outside work hours, you’ll usually find me: ⦁ Reading technical blogs & Medium posts ⦁ Solving CTFs to sharpen hands-on skills ⦁ Exploring Red Team techniques ⦁ Growing steadily in offensive security I’m still early in my red-team journey — I don’t promise instant mastery, but I do promise consistency, discipline, and continuous improvement. I thrive on learning, teamwork, and helping strengthen defenses. Approachable, curious, and always open to mentorship or collaboration. 🛠 Tools & Technical Skills SIEM / Log Management ⦁ Seceon ,Wazuh ,Splunk (Learning) EDR ⦁ CrowdStrike Falcon DLP ⦁ Netwrix Ticketing Tools ⦁ Jira ,BMS Languages ⦁ Python & Bash (Basic) DFIR ⦁ FTK ,Volatility ,Steghide ,Bulk Extractor Malware / Detection Engineering ⦁ YARA Rules & ELK , KQL (Basic) Networking ⦁ Wireshark ,Nmap Operating Systems ⦁ Windows ,Ubuntu ,Kali Linux 💙❤️ “Balanced between attack and defense — that’s where real learning lives.”

Experience

11 mos
Total Experience
11 mos
Average Tenure
11 mos
Current Experience

Confidencial

Security Operations Center Analyst

May 2025Present · 11 mos

  • Working as a security analyst providing 24x7 real-time monitoring, investigation, analysis, reporting, and escalation of security events from multiple log sources.
  • Performing SIEM monitoring and log correlation using Seceon, Wazuh, and Splunk to detect suspicious activities across endpoints, servers, and network infrastructure.
  • Investigating and responding to endpoint security alerts using CrowdStrike Falcon, conducting in-depth analysis, containment, and remediation actions.
  • Managing and tracking incidents through BMS and Jira, ensuring proper documentation, SLA adherence, and severity-based prioritization.
  • Preparing detailed Root Cause Analysis (RCA) reports and SOC performance reports as per client requirements.
  • Performing proactive threat hunting, IOC analysis, phishing investigations, and malicious domain/IP analysis using OSINT tools, and recommending appropriate blocking actions.
  • Creating and fine-tuning SIEM correlation rules and detection use cases to reduce false positives and improve detection efficiency.
  • Preparing daily shift reports and providing detailed handovers to ensure seamless SOC operations.
  • Utilizing downtime productively by practicing hands-on labs in TryHackMe, reading security blogs, researching emerging threats, and learning new cybersecurity technologies to continuously enhance technical skills
  • Assisting in Knowledge Transfer (KT) sessions and mentoring interns while continuously researching emerging security trends and vulnerabilities.
  • Successfully completed the AZ-900 (Azure Fundamentals) certification to strengthen cloud security knowledge and foundational cloud concepts.
WazuhCrowdstrike FalconSeceonSplunkBMSJira+2

Satcom infotech pvt ltd

2 roles

Cyber Security technical intern

Feb 2025Mar 2025 · 1 mo

DLPNetworking

Security Technician

Feb 2025Mar 2025 · 1 mo

  • Investigated DLP alerts, identified unauthorized access attempts, and configured Netwrix for enforcing data access controls and encryption. Assisted clients by providing technical support for DLP-related issues, including installation, configuration, and troubleshooting of security solutions.

Education

Bharathiar University

Master's degree — Cybersecurity

Jul 2023May 2025

PGP college of Engineering and Technology

Bachelor's degree — Physics

Jun 2020May 2023

Stackforce found 100+ more professionals with Security Information And Event Management (siem) & Incident Response

Explore similar profiles based on matching skills and experience