S

Shridhar Sanadi

Product Engineer

Belagavi, Karnataka, India4 yrs 9 mos experience
AI Enabled

Key Highlights

  • Over 4 years of hands-on cybersecurity experience.
  • Expert in incident response and threat detection.
  • Proficient in SOC automation and process optimization.
Stackforce AI infers this person is a Cybersecurity expert specializing in SOC operations and threat intelligence.

Contact

Skills

Core Skills

Security Monitoring & DetectionIncident Response & AnalysisAutomation & Process Optimization

Other Skills

Threat Hunting & IntelligenceData Loss Prevention (DLP) & Cloud SecurityAI-driven automationSOC playbooksIncident response processesEDRXDRMicrosoft DefenderMicrosoft XDRSplunk EnterpriseInternet Protocol Suite (TCP/IP)Cybersecurity ToolsTroubleshootingIT OperationsHelp Desk Support

About

I am a Senior Cybersecurity Consultant with over 4+ years of hands-on experience in 24x7 Security Operations, Threat Detection, Incident Response, and SOC Automation. My expertise spans SIEM, EDR/XDR, DLP, malware analysis, phishing investigations, and threat intelligence, enabling organizations to strengthen their cybersecurity posture and respond swiftly to evolving threats. Key Expertise: Security Monitoring & Detection: Proficient in monitoring and analyzing alerts from Microsoft Sentinel, Splunk, Cortex XSOAR, Firewalls, IDS/IPS, and Microsoft Defender for Endpoint (MDE/XDR). Skilled in identifying and closing false positives while escalating validated incidents for remediation. Incident Response & Analysis: Experienced in investigating phishing emails, malware, brute-force attacks, and suspicious files/URLs using Any.Run sandboxing. Conduct root-cause analysis and provide actionable recommendations to enhance security posture. Threat Hunting & Intelligence: Conduct proactive threat hunting across endpoints, identities, and networks. Analyze telemetry and log data to detect IOCs, anomalies, and malicious activity. Support phishing awareness campaigns and share threat intelligence to improve organizational resilience. Automation & Process Optimization: Develop and maintain SOC playbooks and AI-driven automation agents to streamline detection and response workflows. Hands-on experience monitoring AI/LLM-based agent alerts to detect unsafe or malicious prompt executions. Data Loss Prevention (DLP) & Cloud Security: Implement and manage Forcepoint, Cisco, and Microsoft Purview DLP solutions to minimize insider threats and prevent data exfiltration. Optimize Microsoft Defender for Cloud alerts and access policies to reduce risk. Tools & Technologies: Microsoft Sentinel, Splunk, Cortex XSOAR, Microsoft Defender (EDR/XDR/Cloud/Office 365), Forcepoint & Cisco DLP, Any.Run, VirusTotal, Palo Alto, Cisco Secure Apps, ServiceNow. I am passionate about strengthening enterprise security, leveraging threat intelligence, and implementing proactive measures that reduce risk and enhance organizational cyber resilience.

Experience

4 yrs 9 mos
Total Experience
1 yr 7 mos
Average Tenure
1 yr 7 mos
Current Experience

Ltimindtree

Senior consultant cyber security

Oct 2024Present · 1 yr 7 mos · Bengaluru, Karnataka, India · Hybrid

  • 🔍 Monitoring & Detection
  • Delivered 24x7 security operations support, ensuring uninterrupted monitoring and quick response.
  • Monitored and analyzed security events from SIEM, EDR, Firewalls, IDS/IPS, and other security sources.
  • Handled Microsoft Defender for Endpoint (MDE/XDR) alerts, including high-severity and expert-level cases.
  • Monitored Forcepoint DLP alerts to prevent data exfiltration and insider threats.
  • Identified and closed false positives; escalated validated incidents via ServiceNow for remediation.
  • 🚨 Incident Response & Analysis
  • Investigated, remediated, and tracked incidents through closure with stakeholders and cross-functional teams.
  • Hands-on experience in Phishing Email Analysis, Malware Analysis, and Brute-force Attack Investigations.
  • Performed sandbox analysis of suspicious files/URLs with Any.Run for static & dynamic behavior detection.
  • Documented and escalated incidents as per severity and organizational guidelines.
  • Executed root-cause analysis and provided actionable recommendations to improve security posture.
  • 🕵️ Threat Hunting & Intelligence
  • Conducted proactive threat hunting across endpoints, identities, and network traffic using available log sources.
  • Analysed logs and telemetry data to detect indicators of compromise, anomalies, and malicious activity.
  • Reviewed weekly/monthly threat advisories, sharing insights and actionable intelligence with teams.
  • Supported phishing awareness campaigns across L&T group to strengthen employee cyber awareness.
  • ⚙️ Projects, Automation & Development
  • Developed, maintained, and optimized SOC playbooks and incident response processes.
  • Contributed to the development of AI-driven SOC automation agents to improve detection and response efficiency.
  • Hands-on experience monitoring AI/LLM-based agent alerts to detect unsafe/malicious prompt executions.
Security Monitoring & DetectionIncident Response & AnalysisThreat Hunting & IntelligenceAutomation & Process OptimizationData Loss Prevention (DLP) & Cloud Security

Aequs group

Engineer

Dec 2022Oct 2024 · 1 yr 10 mos · Belagavi, Karnataka, India · On-site

  • 🔍 Monitoring & Detection
  • Delivered 24x7 SOC operations support, ensuring uninterrupted monitoring and quick response.
  • Monitored & analyzed security events via SIEM, EDR, Firewalls, IDS/IPS.
  • Identified and closed false positives; raised tickets for validated incidents.
  • Blocked malicious IOCs in EDR and suspicious domains via Proxy to contain threats.
  • Troubleshot and ensured visibility of silent log sources.
  • 🚨 Incident Response & Analysis
  • Investigated and remediated incidents, coordinating with stakeholders until closure.
  • Hands-on with Phishing Email Analysis, Malware Analysis, and Brute-force Attack Investigations.
  • Performed sandboxing of URLs/attachments using Any.Run for static & dynamic analysis.
  • Documented, escalated, and tracked incidents as per severity & organizational process.
  • 🕵️ Threat Hunting & Intelligence
  • Conducted proactive threat hunting across endpoints, identities, and network traffic.
  • Analyzed logs & telemetry data for signs of compromise, anomalies, or malicious activity.
  • Shared insights from threat advisories, helping improve overall security posture.
Security Monitoring & DetectionIncident Response & AnalysisThreat Hunting & Intelligence

Marine electrical

System Engineer

Aug 2021Dec 2022 · 1 yr 4 mos · Mumbai, Maharashtra, India · On-site

  • 🔍 Monitoring & Detection
  • Delivered 24x7 SOC operations support, ensuring continuous monitoring and rapid response.
  • Monitored and analyzed security events using SIEM, EDR, Firewalls, IDS/IPS, and SOAR tools.
  • Identified and closed false positives; raised and tracked tickets for validated incidents.
  • Ensured visibility by monitoring and troubleshooting silent log sources.
  • 🚨 Incident Response & Analysis
  • Investigated, remediated, and coordinated incident closures with response teams and stakeholders.
  • Hands-on with Phishing Email Analysis, Malware Investigations, and Brute-force Attack Analysis.
  • Performed sandboxing of suspicious URLs and attachments with Any.Run for static & dynamic analysis.
  • Documented, escalated, and tracked incidents as per organizational severity guidelines.
  • 🕵️ Threat Hunting & Intelligence
  • Conducted proactive threat hunting across endpoints, identities, and network traffic.
  • Analyzed logs and telemetry data to detect IOCs, anomalies, and malicious activity.
  • Tracked threat actors’ TTPs and shared actionable insights from advisories to enhance security posture.
  • Contributed to phishing awareness campaigns, strengthening employee cyber resilience.
  • ⚙️ Processes & Reporting
  • Maintained and improved SOC playbooks and processes for efficiency.
  • Researched, compiled, and delivered monthly vulnerability and threat reports.
  • Actively participated in weekly SOC review meetings to discuss incidents and improvements.
Security Monitoring & DetectionIncident Response & AnalysisThreat Hunting & Intelligence

Tata marcopolo motors ltd. dharwad

IT Analyst

Jun 2018Aug 2021 · 3 yrs 2 mos · Dharwad, Karnataka, India · Hybrid

  • Analyzing system requirements and delegating development tasks. Developing and implementing effective IT solutions. Collaborating with team members to improve existing IT systems. Providing technical support and training to users.

Stackforce found 48 more professionals with Security Monitoring & Detection & Incident Response & Analysis

Explore similar profiles based on matching skills and experience