Hiran T V

Operations Associate

Bengaluru, Karnataka, India2 yrs 8 mos experience
Most Likely To Switch

Key Highlights

  • 1.5 years of experience in Cyber Security as SOC Analyst.
  • Expert in monitoring and responding to security incidents.
  • Proficient in using SIEM tools like IBM QRadar and Splunk.
Stackforce AI infers this person is a Cybersecurity professional with expertise in Security Operations and Incident Response.

Contact

Skills

Core Skills

Cyber SecuritySecurity OperationsE-commerceInventory Management

Other Skills

IBM QRadarSecurity InformationEvent Management (SIEM)Log AnalysisIncident ResponseNetwork SecuritySecurity Incident ResponseArcSightSplunkConsultingSalesIT Security OperationsSOCSecurity operationTicketing

About

Overall 2.5 years of experience in different industries and 1.5 year of experience in Cyber security domain as a SOC analyst-intern, where I was 24/7 monitoring, analyzing, and responding to security alerts and incidents. Demonstrated ability to collaborate with cross-functional teams to enhance overall security posture effectively. Adept at utilizing state-of-threat security tools like SIEM tools IBM Qradar, Arcsight, Splunk, Nessus, ServiceNow, and technologies to mitigate risks and ensure compliance with industry standards.

Experience

2 yrs 8 mos
Total Experience
10 mos
Average Tenure
1 yr
Current Experience

Airtel digital

SOC Deputy Manager

May 2025Present · 1 yr · On-site

Ibm

SOC Analyst

May 2024Apr 2025 · 11 mos · Chennai, Tamil Nadu, India · On-site

  • Monitoring 24/7 the customer network using IBMQradar SIEM Tools.
  • Collecting the logs of all the network devices and analyzing the logs to find suspicious activities.
  • Creating and Analyzing daily, weekly, and monthly reports and Dashboards.
  • Looking over the various alerts like IPS, IDS, Antivirus, servers, firewall, Proxy, Email servers, etc.
  • Raising true positive incidents to the respective team for further action.
  • Escalating the incidents to L2 and L3 teams based on the severity of the incidents.
  • Knowledge of the IT network structure and network devices.
  • Knowledge of Network and security devices.
  • Knowledge of open threat intelligence like Virus Total, Cisco Talos intelligence MX Toolbox, IP void, etc.
  • Contacting the customers directly in case of high-priority incidents and helping the customer in the process
  • of mitigating the attacks.
  • Investigate malicious phishing emails, domains, and IPs using Open-Source tools and recommend proper
  • blocking based on analysis.
  • Knowledge of ticketing tools like ServiceNow.
  • Phishing email analysis.
  • Malware Analysis.
  • Cyber kill chain
  • IOC data feed
IBM QRadarSecurity InformationEvent Management (SIEM)Cyber SecuritySecurity Operations

Worldsec technologies

SOC Intern

Mar 2023Dec 2023 · 9 mos · Bengaluru, Karnataka, India · Hybrid

  • Monitoring 24/7 the customer network using ArcSight and Splunk SIEM tools.
  • Collecting the logs of all the network devices and analyzing the logs to find suspicious activities.
  • Creating and Analyzing daily, weekly, and monthly reports and Dashboards.
  • Looking over the various alerts like IPS, IDS, Antivirus, servers, firewall, Proxy, Email servers, etc.
  • Raising true positive incidents to the respective team for further action.
  • Escalating the incidents to L2 and L3 teams based on the severity of the incidents.
  • Knowledge of the IT network structure and network devices.
  • Knowledge of Network and security devices.
  • Knowledge of open threat intelligence like Virus Total, Cisco Talos intelligence MX Toolbox, IP void, etc.
  • Contacting the customers directly in case of high-priority incidents and helping the customer in the process
  • of mitigating the attacks.
  • Investigate malicious phishing emails, domains, and IPs using Open-Source tools and recommend proper
  • blocking based on analysis.
  • Knowledge of ticketing tools like ServiceNow.
  • Phishing email analysis.
  • Malware Analysis.
  • Cyber kill chain
  • IOC data feed
  • EDR Crowdstrike threat detection and response
Network SecuritySecurity Incident ResponseCyber SecuritySecurity Operations

Amazon

Ecommerce Specialist

Dec 2020Dec 2022 · 2 yrs · Bengaluru, Karnataka, India · Remote

  • Managing the Amazon sellers account
  • Product Listings Optimization: Keyword research, compelling descriptions, and image management.
  • Inventory Management: Preventing stockouts and overstocks, coordinating with the supply chain.
  • Advertising and Promotion: Creating and managing Amazon ad campaigns for sales and ROI optimization.
  • Performance Analysis: Analyzing sales metrics for data-driven decision-making.
  • Customer Service and Feedback Management: Addressing inquiries, managing reviews, and improving customer satisfaction.
  • Competitor Analysis: Monitoring competitors to adjust strategies and stay competitive.
  • Compliance and Policies: Ensuring adherence to Amazon's rules and regulations.
  • Training and Skill Development: Staying updated on Amazon tools and features, potentially training others.
ConsultingSalesE-CommerceInventory Management

Bharat petroleum corporation limited

Graduate Apprentice Trainee

Sep 2018Aug 2019 · 11 mos · Mysore, Karnataka, India · On-site

  • I'm able to execute and supervise the operations, Petroleum Logistics management, maintenance, Human resource coordination, Vendor management, fire drill & DCMP, Internal safety audit according to OISD (Oil Industry Safety Directorate).

Education

Srinivas Institute of Technology, Mangalore

Bachelor's degree — Mechanical Engineering

Aug 2013Jun 2017

Vidya Rashmi Vidhyalaya

12th — PCMB

Jun 2011Apr 2013

Stackforce found 100+ more professionals with Cyber Security & Security Operations

Explore similar profiles based on matching skills and experience