RESUME AND JOBCybersecurity professional with 6+ years of experience in Security Operations, Endpoint Security, and Incident Response, specializing in Microsoft Defender for Endpoint (MDE), Microsoft Defender XDR, CrowdStrike Falcon, SIEM monitoring, and threat detection. Experienced in managing enterprise-scale endpoint security environments, investigating security incidents, and implementing security controls to reduce organizational risk. Strong expertise in EDR administration, threat hunting, phishing analysis, and security policy implementation using Microsoft Security solutions and Splunk SIEM.
Security Specialist
LTIMindtree
Administer and manage Microsoft Defender for Endpoint and CrowdStrike Falcon for enterprise endpoint protection. Perform alert triage, investigation, and incident response for endpoint security incidents. Configure and manage endpoint security policies through Microsoft Intune including Antivirus and EDR configurations. Investigate suspicious activities and provide remediation recommendations to reduce security risks. Collaborate with SOC and infrastructure teams to improve detection and response workflows.
Security Engineer
Capgemini
Managed Microsoft Defender for Endpoint operations including onboarding, policy deployment, and troubleshooting. Configured and maintained Attack Surface Reduction (ASR) rules to reduce attack exposure. Administered CrowdStrike Falcon for enterprise endpoint protection, including sensor deployment, policy management, threat detection, and incident response. Investigated security alerts, performed root cause analysis, and implemented mitigation actions. Conducted endpoint health checks and generated compliance and security posture reports. Implemented security controls for risky sign-ins and identity protection using Entra ID. Monitored and analyzed security logs using Splunk SIEM for threat detection and correlation. Supported incident response activities and improved detection efficiency through workflow optimization.
Security Engineer
Atos Syntel
Worked in a 24x7 SOC environment monitoring Microsoft Defender, CrowdStrike Falcon, and Splunk alerts. Performed threat hunting and incident investigations across enterprise environments. Developed incident response runbooks and improved standard operating procedures. Analyzed suspicious files and indicators using threat intelligence platforms.
Security Analyst
TCS
Monitored and investigated endpoint security alerts using EDR tools. Performed MITRE ATT&CK mapping and kill chain analysis during investigations. Identified non-compliant systems and implemented remediation actions. Prepared incident reports and provided mitigation recommendations to stakeholders.
Bachelor of Technology (B.Tech) in Mechanical Engineering
Not Specified
Endpoint & EDR Security
Microsoft Security Stack
SIEM & Monitoring
Security Operations
Tools & Platforms
Microsoft Security Operations Analyst (SC-200)
Microsoft
Cyber Reason Certified Administrator Support
Cybereason
Managed enterprise endpoint security using Microsoft Defender for Endpoint and CrowdStrike Falcon.
Conducted real-time threat analysis using OSINT and malware analysis tools.
Investigated phishing incidents and endpoint compromises.
Correlated EDR and SIEM data to identify attack patterns.
Reduced false positives through tuning of security policies and alerts.
Supported compliance audits and security assessments.
© 2026 Pointers. All rights reserved.
Cybersecurity professional with 6+ years of experience in Security Operations, Endpoint Security, and Incident Response, specializing in Microsoft Defender for Endpoint (MDE), Microsoft Defender XDR, CrowdStrike Falcon, SIEM monitoring, and threat detection. Experienced in managing enterprise-scale endpoint security environments, investigating security incidents, and implementing security controls to reduce organizational risk. Strong expertise in EDR administration, threat hunting, phishing analysis, and security policy implementation using Microsoft Security solutions and Splunk SIEM.
Security Specialist
LTIMindtree
Administer and manage Microsoft Defender for Endpoint and CrowdStrike Falcon for enterprise endpoint protection. Perform alert triage, investigation, and incident response for endpoint security incidents. Configure and manage endpoint security policies through Microsoft Intune including Antivirus and EDR configurations. Investigate suspicious activities and provide remediation recommendations to reduce security risks. Collaborate with SOC and infrastructure teams to improve detection and response workflows.
Security Engineer
Capgemini
Managed Microsoft Defender for Endpoint operations including onboarding, policy deployment, and troubleshooting. Configured and maintained Attack Surface Reduction (ASR) rules to reduce attack exposure. Administered CrowdStrike Falcon for enterprise endpoint protection, including sensor deployment, policy management, threat detection, and incident response. Investigated security alerts, performed root cause analysis, and implemented mitigation actions. Conducted endpoint health checks and generated compliance and security posture reports. Implemented security controls for risky sign-ins and identity protection using Entra ID. Monitored and analyzed security logs using Splunk SIEM for threat detection and correlation. Supported incident response activities and improved detection efficiency through workflow optimization.
Security Engineer
Atos Syntel
Worked in a 24x7 SOC environment monitoring Microsoft Defender, CrowdStrike Falcon, and Splunk alerts. Performed threat hunting and incident investigations across enterprise environments. Developed incident response runbooks and improved standard operating procedures. Analyzed suspicious files and indicators using threat intelligence platforms.
Security Analyst
TCS
Monitored and investigated endpoint security alerts using EDR tools. Performed MITRE ATT&CK mapping and kill chain analysis during investigations. Identified non-compliant systems and implemented remediation actions. Prepared incident reports and provided mitigation recommendations to stakeholders.
Bachelor of Technology (B.Tech) in Mechanical Engineering
Not Specified
Endpoint & EDR Security
Microsoft Security Stack
SIEM & Monitoring
Security Operations
Tools & Platforms
Microsoft Security Operations Analyst (SC-200)
Microsoft
Cyber Reason Certified Administrator Support
Cybereason
Managed enterprise endpoint security using Microsoft Defender for Endpoint and CrowdStrike Falcon.
Conducted real-time threat analysis using OSINT and malware analysis tools.
Investigated phishing incidents and endpoint compromises.
Correlated EDR and SIEM data to identify attack patterns.
Reduced false positives through tuning of security policies and alerts.
Supported compliance audits and security assessments.
© 2026 Pointers. All rights reserved.