Khaja Sayed

Khaja Sayed

$35/hr
Cyber Security operation center Analyst
Reply rate:
-
Availability:
Hourly ($/hour)
Age:
34 years old
Location:
Riyadh, Riyadh, Saudi Arabia
Experience:
4 years
Sayed Khaja SOC Analyst (--Riyadh, Saudi Arabia LinkedIn Professional Summary: Dedicated and experienced Security Operations Center (SOC) Analyst with 4 years of expertise in monitoring and analyzing alerts from various security, network, and database systems. Proficient in using SIEM, EDR, antivirus, and proxy tools to detect, contain, and eradicate security threats. Adept at incident management, vulnerability assessment, and cloud security with a strong commitment to maintaining high levels of security. Experience Company: Centillion Networks Designation: SOC Analyst | Mar 2021- Feb 2025. Roles and Responsibilities: • Using IBM Qradar for monitoring and analyzing alerts triggered by Security, Network and Databases etc. • Creating and Checking dashboards and offenses daily Analyzing and raising incidents for suspicious activities. • Good knowledge on End point tools. Analysis of malicious threat files and taking Corrective and preventive actions. • Analysis of Phishing mails and taking necessary actions Creating tickets in Service now and working with different teams. • Updating and resolving the tickets on a regular basis within SLA. • Knowledge on IPS to detect and prevent threat signatures. analyzing the suspicious signatures and blocking them whenever required. • • • • AWS GD for Cloud security. Monitoring the alerts from cloud instances and acting accordingly. Running scans using Qualys for the assets and reporting the pending vulnerabilities. Knowledge on McAfee AV for detecting the suspicious/ malicious files from end machines. Monitoring Zscaler proxy for URL's access made and verifying the patient 0 alerts triggered for suspicious file downloads. Technology: SIEM Tool used: Qradar • Monitoring and analyzing logs received from the Security, Network and Databases etc. • Analyzing the offenses and identification of true positives. Taking necessary actions towards the • • • • containment and eradication. Identification of false positives and working on rule fine tune, reference set modifications. Creating dashboards with IOC's to simply monitor the activity for different attacks Rule fine tuning and log source integration to Qradar Sending monthly and weekly reports to the clients about the activities being done Technology: EDR Tool used: Crowd Strike falcon • • • • • Real time threat hunting using EDR Monitoring Incidents/ detections and taking necessary actions Containing hosts, blocking malicious hashes. Investigating alerts, containing and mitigating threats Correlating the EDR logs with other security tools to automate and understand attack flow. Technology: IPS Tool Used: FireEye • Monitoring and analyzing alerts for suspicious signatures • Moving signatures to block whichever allowed with known risk • Verifying the assets affected by critical signatures for unpatched Vulnerabilities and informing respective owners to apply patches. Technology: Phishing Analysis • Working on analysis of phishing mails • Analyzing the mail's headers. Taking necessary actions on blocking IOC's (Senders, URL's. attachment hashes etc...) Technology: Vulnerability Assessment Tool Used: Qualys • Scanning the assets • Checks for the Vulnerabilities • Reporting to the Servers owners to apply the patches Technology: Incident management Tool used: Service now • Creating tickets and working with teams • Reporting the ticket maintenance • Updating and resolving the tickets and regular basis Other technologies: AWS GD and Zscaler • • • • Monitoring the security findings from Cloud instances using AWS Guard Duty Suppressing the false alerts and taking the actions on malicious attack indicators. Using Vectra AI to detect threats early and mitigate risks Using Zscaler for analysis for proxy traffic and correlating the logs with EDR to identify the process initiating traffic towards malicious domains. • Verifying the patient 0 alerts triggered for suspicious file downloads. Company: STC, Saudi Arabia. Designation: Network Engineer | Jun 2016 – Nov 2020 Roles and Responsibilities: • Perform responsibilities Designing of FTTx/GPON and None GPON networks. • Having depth knowledge about read fundamental network planning, route Selection, presenting • • • • • fiber connections in FJS, design BOQ using with ISOW. Designing of OSP network and generate Schematic drawings from NE database. Designs are issued based on STC standards. Hands on work experience with latest version of TELCORDIA NETWORK ENGINEER, ARC MAP, ISOW and AUTOCAD MAP. Good Experience in FIBER TELECOM NETWORK (As-built in Civil & Fiber) Design and having depth knowledge about FIBER Telecom network domain. Digital conversion of Maps / Images by using AutoCAD and GIS Software. Data conversion: Raster data to vector data and other various GIS based data formats. SKILLS • Phishing Analysis • Endpoint Security • Cloud Security • Vulnerability Assessment • Incident Management • Proxy (Zscaler) • SIEM (IBM QRADAR) • EDR (Crowd Strike Falcon) • OKTA EDUCATION • Bachelor of Science, from Ambedkar University, India. • Intermediate, Board of Intermediate Education A P, India. • SSC, Board of Secondary Education, A P, India. PERSONNEL • • • • • Nationality Date of Birth Iqama Notice Period LinkedIn Profile : : : : : Indian- Valid & Transferable Immediate Joiner https://www.linkedin.com/in/khaja-sayed-soc/
Get your freelancer profile up and running. View the step by step guide to set up a freelancer profile so you can land your dream job.