B Chandrakanth Email and Phone Number
Overall 3+ Years of Experience as a Cyber Security/Information security Analyst with proficient and thorough experience and a good understanding of information security. Specialized in proactive network monitoring of Splunk/Azure Sentinel SIEM, Sentinel One EDR & Microsoft Defender in a Security Operation Center (SOC) environment.
Calsoft
View- Website:
- calsoftinc.com
- Employees:
- 1008
-
Soc AnalystCalsoft Jul 2022 - PresentPune, Maharashtra, IndiaPerforming real-time Monitoring, Analyzing, and Investigating of logswith Reporting,Escalation and resolve of various Incidents/Events/Security Alertstriggered in SIEM tool from multiple log sourcesUtilize Firewall, Windows & Antivirus Logs to monitor maliciousactivities on the network, IPS/IDS logs to uncover malicious activitygoing on within networkIdentify and ingest indicators of compromise (IOCs), e.gMalicious IPs/URLs, e.g., into network tools/applications… Show more Performing real-time Monitoring, Analyzing, and Investigating of logswith Reporting,Escalation and resolve of various Incidents/Events/Security Alertstriggered in SIEM tool from multiple log sourcesUtilize Firewall, Windows & Antivirus Logs to monitor maliciousactivities on the network, IPS/IDS logs to uncover malicious activitygoing on within networkIdentify and ingest indicators of compromise (IOCs), e.gMalicious IPs/URLs, e.g., into network tools/applications stay up todate with current vulnerabilities, attacksProviding logs to different teams from Splunk ES as and when requestfor logs receivedMonitoring and perform in-depth analysis of security alerts using theCarbon Black platformPerform Malware Analysis by Static and Dynamic methods to identifymaliciousIOCs-indicator of compromise, taking action around IOCs identifiedCreating Reports issues identified during monitoring the live traffic,also preparing.Preparing reports on daily basis by understanding the incidents todetermine whether it is based on True Positive and False PositiveMonitoring and perform in-depth analysis of security alerts using theSentinelOne platform / Microsoft 365 DefenderCreation of Jira/ServiceNow Tickets with different support teamsbased on the alerts requirement with proper track and closure withjustificationUpdating of shift handover document and ensuring proper handoveris doneSpecialized Proof point TAP, Force point Proxy & Carbon Black EDRInvestigate all reported suspicious emails and determine whether theemails are malicious. Show less -
Soc AnalystGenpact Mar 2022 - Jun 2022Hyderabad, Telangana, IndiaPerforming real-time Monitoring, Analyzing, and Investigating of logswith Reporting, Escalation, and resolution of various Incidents/Events/Security Alerts triggered in the SIEM tool from multiple log sourcesUtilize Firewall, Windows & Antivirus Logs to monitor maliciousactivities on the network, IPS/IDS logs to uncover malicious activitygoing on within network.Performing real-time Monitoring, Analyzing, and investigating thealerts with Reporting, Escalation and… Show more Performing real-time Monitoring, Analyzing, and Investigating of logswith Reporting, Escalation, and resolution of various Incidents/Events/Security Alerts triggered in the SIEM tool from multiple log sourcesUtilize Firewall, Windows & Antivirus Logs to monitor maliciousactivities on the network, IPS/IDS logs to uncover malicious activitygoing on within network.Performing real-time Monitoring, Analyzing, and investigating thealerts with Reporting, Escalation and resolve of various EDR tools.Providing logs to different teams from Splunk ES as and when requestfor logs received.Perform Malware Analysis by Static and Dynamic methods to identifythe malicious IOCs-indicator of compromise, taking action aroundIOCs identified.Monitoring and perform in-depth analysis of security alerts using theSentinel One platform.Working on multiple tools to perform a day-to-day task, like havingSymantec AV, SentinelOne Response and Protect, Symantec DLP, andmany more.Investigate all reported suspicious emails and determine whether theemails are malicious, non-malicious or legitimate and reply to the userwho reported the suspicious email with a message reporting thefindings and any recommendationsMonitored system performance and responded to alertsInstalled, configured, and supported local area network (LAN), widearea network (WAN), and Internet system.Coordinated with third-party security information and eventmanagement (SIEM) providers to maintain protections and predictthreats. Show less -
Jr. Soc AnalystAltruist Technologies Pvt. Ltd. Oct 2020 - Jan 2022Hyderabad, Telangana, IndiaPerforming real-time Monitoring, Analyzing, and Investigating of logswith Reporting, Escalation, and resolution of various Incidents/Events/Security Alerts triggered in the SIEM tool from multiple log sourcesUtilize Firewall, Windows & Antivirus Logs to monitor maliciousactivities on the network, IPS/IDS logs to uncover malicious activitygoing on within network.Performing real-time Monitoring, Analyzing, and investigating thealerts with Reporting, Escalation and… Show more Performing real-time Monitoring, Analyzing, and Investigating of logswith Reporting, Escalation, and resolution of various Incidents/Events/Security Alerts triggered in the SIEM tool from multiple log sourcesUtilize Firewall, Windows & Antivirus Logs to monitor maliciousactivities on the network, IPS/IDS logs to uncover malicious activitygoing on within network.Performing real-time Monitoring, Analyzing, and investigating thealerts with Reporting, Escalation and resolve of various EDR tools.Providing logs to different teams from Splunk ES as and when requestfor logs received.Perform Malware Analysis by Static and Dynamic methods to identifythe malicious IOCs-indicator of compromise, taking action aroundIOCs identified.Monitoring and perform in-depth analysis of security alerts using theSentinel One platform.Working on multiple tools to perform a day-to-day task, like havingSymantec AV, SentinelOne Response and Protect, Symantec DLP, andmany more.Investigate all reported suspicious emails and determine whether theemails are malicious, non-malicious or legitimate and reply to the userwho reported the suspicious email with a message reporting thefindings and any recommendationsMonitored system performance and responded to alertsInstalled, configured, and supported local area network (LAN), widearea network (WAN), and Internet system.Coordinated with third-party security information and eventmanagement (SIEM) providers to maintain protections and predictthreats. Show less
B Chandrakanth Education Details
-
Bsc-Computers
Frequently Asked Questions about B Chandrakanth
What company does B Chandrakanth work for?
B Chandrakanth works for Calsoft
What is B Chandrakanth's role at the current company?
B Chandrakanth's current role is SOC Analyst at Calsoft | SIEM | Splunk ES | Azure Sentinel | EDR | Incident Response | Phishing Analysis | Malware Analysis.
What schools did B Chandrakanth attend?
B Chandrakanth attended Osmania University.
Who are B Chandrakanth's colleagues?
B Chandrakanth's colleagues are Tapanwita Mohanty, Niladri Sekhar Sarkar, Aravinth M, Sameera Sulthana Shaik, Aryan Nagar, Rajshekar Chavakula, Vani Nadgouda.
Not the B Chandrakanth you were looking for?
-
B. Chandrakanth
Macherla -
B Chandrakanth
India -
B Chandrakanth
Hyderabad -
B Chandrakanth
South Delhi
Free Chrome Extension
Find emails, phones & company data instantly
Aero Online
Your AI prospecting assistant
Select data to include:
0 records × $0.02 per record
Download 750 million emails and 100 million phone numbers
Access emails and phone numbers of over 750 million business users. Instantly download verified profiles using 20+ filters, including location, job title, company, function, and industry.
Start your free trial