Sayed Khaja
SOC Analyst
(--Riyadh, Saudi Arabia
LinkedIn
Professional Summary:
Dedicated and experienced Security Operations Center (SOC) Analyst with 4 years of expertise
in monitoring and analyzing alerts from various security, network, and database systems.
Proficient in using SIEM, EDR, antivirus, and proxy tools to detect, contain, and eradicate
security threats. Adept at incident management, vulnerability assessment, and cloud security
with a strong commitment to maintaining high levels of security.
Experience
Company: Centillion Networks
Designation: SOC Analyst | Mar 2021- Feb 2025.
Roles and Responsibilities:
• Using IBM Qradar for monitoring and analyzing alerts triggered by Security, Network and Databases
etc.
• Creating and Checking dashboards and offenses daily Analyzing and raising incidents for suspicious
activities.
• Good knowledge on End point tools. Analysis of malicious threat files and taking Corrective and
preventive actions.
• Analysis of Phishing mails and taking necessary actions Creating tickets in Service now and working
with different teams.
• Updating and resolving the tickets on a regular basis within SLA.
• Knowledge on IPS to detect and prevent threat signatures. analyzing the suspicious signatures and
blocking them whenever required.
•
•
•
•
AWS GD for Cloud security. Monitoring the alerts from cloud instances and acting accordingly.
Running scans using Qualys for the assets and reporting the pending vulnerabilities.
Knowledge on McAfee AV for detecting the suspicious/ malicious files from end machines.
Monitoring Zscaler proxy for URL's access made and verifying the patient 0 alerts triggered for
suspicious file downloads.
Technology: SIEM
Tool used: Qradar
• Monitoring and analyzing logs received from the Security, Network and Databases etc.
• Analyzing the offenses and identification of true positives. Taking necessary actions towards the
•
•
•
•
containment and eradication.
Identification of false positives and working on rule fine tune, reference set modifications.
Creating dashboards with IOC's to simply monitor the activity for different attacks
Rule fine tuning and log source integration to Qradar
Sending monthly and weekly reports to the clients about the activities being done
Technology: EDR
Tool used: Crowd Strike falcon
•
•
•
•
•
Real time threat hunting using EDR
Monitoring Incidents/ detections and taking necessary actions
Containing hosts, blocking malicious hashes.
Investigating alerts, containing and mitigating threats
Correlating the EDR logs with other security tools to automate and understand attack flow.
Technology: IPS
Tool Used: FireEye
• Monitoring and analyzing alerts for suspicious signatures
• Moving signatures to block whichever allowed with known risk
• Verifying the assets affected by critical signatures for unpatched Vulnerabilities and
informing respective owners to apply patches.
Technology: Phishing Analysis
• Working on analysis of phishing mails
• Analyzing the mail's headers. Taking necessary actions on blocking IOC's (Senders,
URL's. attachment hashes etc...)
Technology: Vulnerability Assessment
Tool Used: Qualys
• Scanning the assets
• Checks for the Vulnerabilities
• Reporting to the Servers owners to apply the patches
Technology: Incident management
Tool used: Service now
• Creating tickets and working with teams
• Reporting the ticket maintenance
• Updating and resolving the tickets and regular basis
Other technologies: AWS GD and Zscaler
•
•
•
•
Monitoring the security findings from Cloud instances using AWS Guard Duty
Suppressing the false alerts and taking the actions on malicious attack indicators.
Using Vectra AI to detect threats early and mitigate risks
Using Zscaler for analysis for proxy traffic and correlating the logs with EDR to identify the process
initiating traffic towards malicious domains.
• Verifying the patient 0 alerts triggered for suspicious file downloads.
Company: STC, Saudi Arabia.
Designation: Network Engineer | Jun 2016 – Nov 2020
Roles and Responsibilities:
• Perform responsibilities Designing of FTTx/GPON and None GPON networks.
• Having depth knowledge about read fundamental network planning, route Selection, presenting
•
•
•
•
•
fiber connections in FJS, design BOQ using with ISOW.
Designing of OSP network and generate Schematic drawings from NE database. Designs are issued
based on STC standards.
Hands on work experience with latest version of TELCORDIA NETWORK ENGINEER, ARC MAP,
ISOW and AUTOCAD MAP.
Good Experience in FIBER TELECOM NETWORK (As-built in Civil & Fiber) Design and having depth
knowledge about FIBER Telecom network domain.
Digital conversion of Maps / Images by using AutoCAD and GIS Software.
Data conversion: Raster data to vector data and other various GIS based data formats.
SKILLS
• Phishing Analysis
• Endpoint Security
• Cloud Security
• Vulnerability Assessment
• Incident Management
• Proxy (Zscaler)
• SIEM (IBM QRADAR)
• EDR (Crowd Strike Falcon)
• OKTA
EDUCATION
• Bachelor of Science, from Ambedkar University, India.
• Intermediate, Board of Intermediate Education A P, India.
• SSC, Board of Secondary Education, A P, India.
PERSONNEL
•
•
•
•
•
Nationality
Date of Birth
Iqama
Notice Period
LinkedIn Profile
:
:
:
:
:
Indian-
Valid & Transferable
Immediate Joiner
https://www.linkedin.com/in/khaja-sayed-soc/