SOC (Aug, 2021
–Present) at Trillium information security System, Rawalpindi
During my tenure as a Security Operations Center (SOC) Level 1 analyst at Trillium (TISS), I had the opportunity to gain valuable experience in the field of cybersecurity. As an integral part of the SOC team, my primary responsibility was to monitor and analyze security events and incidents, ensuring the timely detection, response, and resolution of potential threats to our organization's information systems.
On a day-to-day basis, I actively monitored various security tools, such as intrusion detection systems, firewalls, and log management platforms, to identify any suspicious activities or anomalies. I conducted preliminary investigations into these events, analyzing indicators of compromise and determining their severity levels. With a solid understanding of incident response protocols and best practices, I promptly escalated critical incidents to higher-level analysts or the SOC manager for further investigation and mitigation.
Additionally, I played a crucial role in maintaining and fine-tuning security systems and technologies, ensuring their optimal performance and effectiveness. I collaborated closely with other members of the SOC team to develop and refine standard operating procedures, guidelines, and playbooks for incident detection, response, and resolution. Through continuous monitoring and analysis, I contributed to the improvement of our organization's security posture by identifying vulnerabilities, recommending mitigations, and assisting in vulnerability management efforts.
Overall, my experience as a SOC Level 1 analyst provided me with a solid foundation in security monitoring, incident detection, and response. It equipped me with the necessary skills to handle security incidents in a fast-paced environment, work collaboratively within a team, and contribute to the overall security strategy of an organization.