Mohammed Humaid

Mohammed Humaid

$3/hr
My daily work is to triage the websites using splunk
Reply rate:
-
Availability:
Full-time (40 hrs/wk)
Location:
Hyderabad, Telangana, India
Experience:
1 year
CONT ACT  -  -  5-7-30/N/13 Masdoos Nagar, Mahbubnagar EDUC AT ION Mohammed Humaid SOC ANALYST – TIER 1 Dedicated and passionate SOC Analyst with 1.2 years of experience in Security Operations Centers (SOC). Skilled in identifying and mitigating cybersecurity threats, and proficient in threat remediation techniques. A goal-oriented team player with strong logical, analytical, problem-solving, and interpersonal skills. Eager to learn and explore new challenges in cybersecurity.  B ACH E LO R O F CO MPU TE R SCI E NCE AND E NGI NEE RI NG – JNTU – 67.2%  INTERMEDIATE - Vagdevi junior College – 68% EX P ERIENCE  SSC - Chaitanya High School – 83% MOLD- T EK P ACKAGING LIMIT ED Feb 2024 – Present  Spearhead real-time monitoring and triaging the security alerts, understanding IOCs, Cyber Threats, and Attack Methodology using Splunk and EDR Solutions.  Perform threat hunt activity to proactively identify malicious attack patterns and blocking associated indicators on network perimeter.  Experience in Handling Phishing related incidents by performing Header Analysis and message trace leveraging Microsoft Defender for Office 365 (MDO) and Proofpoint.  Proactively monitoring sign in anomalies by leveraging Microsoft Defender for Identity (MDI-Sign-in Logs) and addressing the compromised accounts on priority.  Collaborate with multidisciplinary teams to develope and implement incident response strategies, minimising downtown, and potential breaches.  Contribute to the refinement of SOC process and procedures, adhering to the OKRs. SKI LLS  OWASP: Broken Access Control  Cross Site Scripting  Vulnerability testing, File Upload Vulnerabilities.  Cryptographic failures,  SQL INJECTIONS and HTMT/XML INJECTIONS,  Email Spoofing  Identification & Authentication failures  Software data Integrity failures, SSRF,  Information Leakage  Dialog Programming  Directory Traversal  Malvertising  SSL Stripping.
Get your freelancer profile up and running. View the step by step guide to set up a freelancer profile so you can land your dream job.