Thota Srikanth

Thota Srikanth

$10/hr
Cybersecurity Analyst | Threat Intelligence | Incident Response | SIEM Expert
Reply rate:
-
Availability:
Hourly ($/hour)
Age:
26 years old
Location:
Hyderabad, Telangana, India
Experience:
3 years
Srikanth Thota Email:-| Ph No: - Professional Summary Cybersecurity Analyst with over 3+ years of experience in Security Operations, GRC, and Threat Intelligence. Skilled in SIEM tools like Microsoft Sentinel and Splunk, and experienced in risk assessments, incident response, and ISO 27001/NIST compliance. Proven ability to bridge technical security operations with policybased frameworks. Strong in threat hunting, vulnerability analysis, audit readiness, and scripting automation in Python and PowerShell. Familiar with GDPR, Cyber Essentials, and SOC setup and operations. Professional Experience Security Analyst General Logic Pvt. Ltd., Hyderabad |March 2024 – Present               Delivered comprehensive ISO 27001 gap assessments, identifying security weaknesses and building tailored remediation roadmaps to improve client ISMS maturity. Facilitated client workshops to communicate risks and compliance requirements effectively. Conducted NIST CSF maturity reviews and risk analysis sessions, aligning organizational security goals with business objectives and recommending prioritized improvements for risk reduction. Developed and optimized SOC detection use cases based on MITRE ATT&CK and NIST 800-53, improving alert accuracy and reducing false positives for better incident detection and response. Led the design and implementation of security policies, risk registers, and controls, supporting client audits and certification readiness activities such as Cyber Essentials and ISO surveillance audits. Automated repetitive SOC workflows, including IOC enrichment and log parsing, by developing Python scripts, enhancing SOC efficiency and reducing analyst workload. Managed real-time monitoring and incident triage on Microsoft Sentinel and Splunk, performing indepth analysis to identify malicious activity and coordinate incident response. Researched and profiled adversary TTPs using multiple OSINT platforms such as Shodan, VirusTotal, and Maltego to enrich threat intelligence and improve proactive defenses. Authored detailed risk assessment reports, audit findings, and remediation status updates, communicating complex technical information clearly to both technical teams and executive leadership. Mentored junior analysts on best practices in threat hunting, log analysis, and vulnerability prioritization, fostering a culture of continuous learning and improvement within the team. Created comprehensive SOC documentation including standard operating procedures, incident playbooks, and compliance templates to streamline operations and support audit requirements. Participated in tabletop and simulation exercises to test incident response capabilities, identify detection gaps, and improve readiness for real-world cyber threats. Designed client-facing dashboards for tracking audit progress, vulnerability remediation, and risk treatment activities, providing clear visibility into security posture. Maintained ongoing communication with key stakeholders through weekly meetings, presenting security updates, risk summaries, and next steps to ensure alignment with client expectations. Collaborated closely with cross-functional teams including DevOps, cloud, and application owners to conduct security posture assessments and drive remediation actions for identified vulnerabilities. SOC Analyst Info Matrix Digital Solutions | 2022 – 2024               Skills          Monitored Tier-2 security alerts across Splunk and Microsoft Sentinel, performing detailed analysis on incidents such as phishing campaigns, privilege abuse, and data exfiltration to guide timely response actions. Conducted OSINT investigations to map threat actor infrastructure and behaviors, compiling actionable TTP and IOC reports to enhance detection and response strategies. Developed and maintained detection rules and dashboards within Splunk aligned to MITRE ATT&CK techniques and NIST 800-53 controls, improving the SOC’s ability to identify sophisticated threats. Prepared detailed incident reports summarizing attack timelines, affected assets, and recommended mitigations, supporting post-incident reviews and continuous improvement. Assisted compliance teams by conducting log reviews and validating SIEM use cases to ensure adherence to regulatory requirements such as GDPR and ISO 27001. Supported risk and security posture assessments by identifying gaps in controls, recommending corrective actions, and contributing to audit evidence preparation. Tuned correlation rules and detection logic continuously to reduce false positives and optimize analyst focus on high-risk alerts. Performed malware triage using sandbox environments and threat enrichment tools like VirusTotal to rapidly classify and contain malicious code. Developed and maintained asset inventories and risk registers, providing comprehensive visibility into organizational attack surfaces and vulnerabilities. Authored in-depth profiles on threat actors and campaigns to inform threat hunting and proactive security measures. Collaborated in Purple Team exercises to test and improve detection capabilities, leveraging real-world attack simulations to validate controls. Stayed current on emerging cyber threats, vulnerabilities, and zero-day exploits, sharing intelligence updates with SOC teams to maintain situational awareness. Facilitated internal ISO 27001 meetings and client workshops, presenting findings, managing expectations, and coordinating remediation efforts. Managed the full incident lifecycle including root cause analysis, remediation tracking, and closure documentation to ensure comprehensive resolution and audit compliance. Security Operations: SIEM Monitoring, SOC Setup, Incident Response, Threat Hunting, Purple Teaming GRC & Compliance: Risk Assessments, ISO 27001, NIST CSF, GDPR, Cyber Essentials, Audit Support Threat Intelligence: IOC/TTP Analysis, Threat Actor Research, OSINT, CTI Writing Tools & Platforms: Microsoft Sentinel, Splunk, Shodan, Maltego, VirusTotal, Recorded Future Security Technologies: IDS/IPS, Firewalls, Antivirus, Endpoint Protection, Vulnerability Scanners Scripting & Automation: Python, PowerShell, Bash – Log Analysis, IOC Enrichment, SOC Tasks Documentation: Audit Reports, Risk Registers, Incident Reports, Threat Intelligence Briefs Networking: TCP/IP, DNS, VPNs, Firewall Rules, Network Monitoring Soft Skills: Analytical Thinking, Stakeholder Communication, Mentorship, Workshop Facilitation Education B.Tech in Mechanical Engineering-Seshadri Rao Gudlavalleru Engineering College, Andhra Pradesh — 2020 Projects & Contributions       Built a home SOC lab with Splunk, Sysmon, and MITRE ATT&CK integration for hands-on detection engineering and incident response practice. Authored multiple blogs on best practices in CTI report writing, adversary emulation, and audit preparation for cybersecurity teams. Developed Python automation scripts to streamline threat feed ingestion and IOC scoring processes, improving analyst productivity. Created visual dashboards for tracking NIST CSF maturity and SOC key performance indicators, aiding management oversight. Ranked in the Top 25% globally in the Splunk BOTS Capture The Flag (CTF) competition by demonstrating strong detection and investigation skills. Actively participate in cybersecurity forums, CTI working groups, and mentor junior analysts through knowledge-sharing initiatives. (Srikanth Thota)
Get your freelancer profile up and running. View the step by step guide to set up a freelancer profile so you can land your dream job.