Resume and JobRESUME AND JOB
All Profiles

K MANIKANTA

India

About

Cybersecurity professional with 6+ years of experience in Security Operations, Endpoint Security, and Incident Response, specializing in Microsoft Defender for Endpoint (MDE), Microsoft Defender XDR, CrowdStrike Falcon, SIEM monitoring, and threat detection. Experienced in managing enterprise-scale endpoint security environments, investigating security incidents, and implementing security controls to reduce organizational risk. Strong expertise in EDR administration, threat hunting, phishing analysis, and security policy implementation using Microsoft Security solutions and Splunk SIEM.

Experience

Security Specialist

LTIMindtree

Oct 2025 – Feb 2026

Administer and manage Microsoft Defender for Endpoint and CrowdStrike Falcon for enterprise endpoint protection. Perform alert triage, investigation, and incident response for endpoint security incidents. Configure and manage endpoint security policies through Microsoft Intune including Antivirus and EDR configurations. Investigate suspicious activities and provide remediation recommendations to reduce security risks. Collaborate with SOC and infrastructure teams to improve detection and response workflows.

  • Administered and managed Microsoft Defender for Endpoint and CrowdStrike Falcon for enterprise endpoint protection.
  • Performed alert triage, investigation, and incident response for endpoint security incidents.
  • Configured and managed endpoint security policies through Microsoft Intune including Antivirus and EDR configurations.
  • Investigated suspicious activities and provided remediation recommendations to reduce security risks.
  • Collaborated with SOC and infrastructure teams to improve detection and response workflows.

Security Engineer

Capgemini

Aug 2022 – Sep 2025

Managed Microsoft Defender for Endpoint operations including onboarding, policy deployment, and troubleshooting. Configured and maintained Attack Surface Reduction (ASR) rules to reduce attack exposure. Administered CrowdStrike Falcon for enterprise endpoint protection, including sensor deployment, policy management, threat detection, and incident response. Investigated security alerts, performed root cause analysis, and implemented mitigation actions. Conducted endpoint health checks and generated compliance and security posture reports. Implemented security controls for risky sign-ins and identity protection using Entra ID. Monitored and analyzed security logs using Splunk SIEM for threat detection and correlation. Supported incident response activities and improved detection efficiency through workflow optimization.

  • Managed Microsoft Defender for Endpoint operations including onboarding, policy deployment, and troubleshooting.
  • Configured and maintained Attack Surface Reduction (ASR) rules to reduce attack exposure.
  • Administered CrowdStrike Falcon for enterprise endpoint protection, including sensor deployment, policy management, threat detection, and incident response.
  • Investigated security alerts, performed root cause analysis, and implemented mitigation actions.
  • Conducted endpoint health checks and generated compliance and security posture reports.
  • Implemented security controls for risky sign-ins and identity protection using Entra ID.
  • Monitored and analyzed security logs using Splunk SIEM for threat detection and correlation.
  • Supported incident response activities and improved detection efficiency through workflow optimization.

Security Engineer

Atos Syntel

Sep 2021 – Aug 2022

Worked in a 24x7 SOC environment monitoring Microsoft Defender, CrowdStrike Falcon, and Splunk alerts. Performed threat hunting and incident investigations across enterprise environments. Developed incident response runbooks and improved standard operating procedures. Analyzed suspicious files and indicators using threat intelligence platforms.

  • Worked in a 24x7 SOC environment monitoring Microsoft Defender, CrowdStrike Falcon, and Splunk alerts.
  • Performed threat hunting and incident investigations across enterprise environments.
  • Developed incident response runbooks and improved standard operating procedures.
  • Analyzed suspicious files and indicators using threat intelligence platforms.

Security Analyst

TCS

Sep 2019 – Sep 2021

Monitored and investigated endpoint security alerts using EDR tools. Performed MITRE ATT&CK mapping and kill chain analysis during investigations. Identified non-compliant systems and implemented remediation actions. Prepared incident reports and provided mitigation recommendations to stakeholders.

  • Monitored and investigated endpoint security alerts using EDR tools.
  • Performed MITRE ATT&CK mapping and kill chain analysis during investigations.
  • Identified non-compliant systems and implemented remediation actions.
  • Prepared incident reports and provided mitigation recommendations to stakeholders.

Education

Bachelor of Technology (B.Tech) in Mechanical Engineering

Not Specified

Jan 2015

Skills

Endpoint & EDR Security

Microsoft Defender for Endpoint (MDE)· ExpertCrowdStrike Falcon· ExpertTrellix ePO· AdvancedDefender Antivirus· ExpertSymantec Endpoint Protection· Advanced

Microsoft Security Stack

Microsoft Defender XDR· ExpertMicrosoft Defender for Office 365 (MDO)· ExpertMicrosoft Intune· ExpertEntra ID (Azure AD)· Expert

SIEM & Monitoring

Splunk Enterprise· ExpertLog Analysis· ExpertAlert Correlation· ExpertThreat Detection· Expert

Security Operations

Incident Response· ExpertThreat Hunting· ExpertMalware Analysis· ExpertPhishing Investigation· ExpertIOC Analysis· Expert

Tools & Platforms

ServiceNow· AdvancedVirusTotal· AdvancedHybrid Analysis· AdvancedAbuseIPDB· AdvancedOSINT Tools· Advanced

Certifications

Microsoft Security Operations Analyst (SC-200)

Microsoft

Cyber Reason Certified Administrator Support

Cybereason

KEY RESPONSIBILITIES & ACHIEVEMENTS

Managed enterprise endpoint security using Microsoft Defender for Endpoint and CrowdStrike Falcon.

Conducted real-time threat analysis using OSINT and malware analysis tools.

Investigated phishing incidents and endpoint compromises.

Correlated EDR and SIEM data to identify attack patterns.

Reduced false positives through tuning of security policies and alerts.

Supported compliance audits and security assessments.

All Profiles

K MANIKANTA

India

About

Cybersecurity professional with 6+ years of experience in Security Operations, Endpoint Security, and Incident Response, specializing in Microsoft Defender for Endpoint (MDE), Microsoft Defender XDR, CrowdStrike Falcon, SIEM monitoring, and threat detection. Experienced in managing enterprise-scale endpoint security environments, investigating security incidents, and implementing security controls to reduce organizational risk. Strong expertise in EDR administration, threat hunting, phishing analysis, and security policy implementation using Microsoft Security solutions and Splunk SIEM.

Experience

Security Specialist

LTIMindtree

Oct 2025 – Feb 2026

Administer and manage Microsoft Defender for Endpoint and CrowdStrike Falcon for enterprise endpoint protection. Perform alert triage, investigation, and incident response for endpoint security incidents. Configure and manage endpoint security policies through Microsoft Intune including Antivirus and EDR configurations. Investigate suspicious activities and provide remediation recommendations to reduce security risks. Collaborate with SOC and infrastructure teams to improve detection and response workflows.

  • Administered and managed Microsoft Defender for Endpoint and CrowdStrike Falcon for enterprise endpoint protection.
  • Performed alert triage, investigation, and incident response for endpoint security incidents.
  • Configured and managed endpoint security policies through Microsoft Intune including Antivirus and EDR configurations.
  • Investigated suspicious activities and provided remediation recommendations to reduce security risks.
  • Collaborated with SOC and infrastructure teams to improve detection and response workflows.

Security Engineer

Capgemini

Aug 2022 – Sep 2025

Managed Microsoft Defender for Endpoint operations including onboarding, policy deployment, and troubleshooting. Configured and maintained Attack Surface Reduction (ASR) rules to reduce attack exposure. Administered CrowdStrike Falcon for enterprise endpoint protection, including sensor deployment, policy management, threat detection, and incident response. Investigated security alerts, performed root cause analysis, and implemented mitigation actions. Conducted endpoint health checks and generated compliance and security posture reports. Implemented security controls for risky sign-ins and identity protection using Entra ID. Monitored and analyzed security logs using Splunk SIEM for threat detection and correlation. Supported incident response activities and improved detection efficiency through workflow optimization.

  • Managed Microsoft Defender for Endpoint operations including onboarding, policy deployment, and troubleshooting.
  • Configured and maintained Attack Surface Reduction (ASR) rules to reduce attack exposure.
  • Administered CrowdStrike Falcon for enterprise endpoint protection, including sensor deployment, policy management, threat detection, and incident response.
  • Investigated security alerts, performed root cause analysis, and implemented mitigation actions.
  • Conducted endpoint health checks and generated compliance and security posture reports.
  • Implemented security controls for risky sign-ins and identity protection using Entra ID.
  • Monitored and analyzed security logs using Splunk SIEM for threat detection and correlation.
  • Supported incident response activities and improved detection efficiency through workflow optimization.

Security Engineer

Atos Syntel

Sep 2021 – Aug 2022

Worked in a 24x7 SOC environment monitoring Microsoft Defender, CrowdStrike Falcon, and Splunk alerts. Performed threat hunting and incident investigations across enterprise environments. Developed incident response runbooks and improved standard operating procedures. Analyzed suspicious files and indicators using threat intelligence platforms.

  • Worked in a 24x7 SOC environment monitoring Microsoft Defender, CrowdStrike Falcon, and Splunk alerts.
  • Performed threat hunting and incident investigations across enterprise environments.
  • Developed incident response runbooks and improved standard operating procedures.
  • Analyzed suspicious files and indicators using threat intelligence platforms.

Security Analyst

TCS

Sep 2019 – Sep 2021

Monitored and investigated endpoint security alerts using EDR tools. Performed MITRE ATT&CK mapping and kill chain analysis during investigations. Identified non-compliant systems and implemented remediation actions. Prepared incident reports and provided mitigation recommendations to stakeholders.

  • Monitored and investigated endpoint security alerts using EDR tools.
  • Performed MITRE ATT&CK mapping and kill chain analysis during investigations.
  • Identified non-compliant systems and implemented remediation actions.
  • Prepared incident reports and provided mitigation recommendations to stakeholders.

Education

Bachelor of Technology (B.Tech) in Mechanical Engineering

Not Specified

Jan 2015

Skills

Endpoint & EDR Security

Microsoft Defender for Endpoint (MDE)· ExpertCrowdStrike Falcon· ExpertTrellix ePO· AdvancedDefender Antivirus· ExpertSymantec Endpoint Protection· Advanced

Microsoft Security Stack

Microsoft Defender XDR· ExpertMicrosoft Defender for Office 365 (MDO)· ExpertMicrosoft Intune· ExpertEntra ID (Azure AD)· Expert

SIEM & Monitoring

Splunk Enterprise· ExpertLog Analysis· ExpertAlert Correlation· ExpertThreat Detection· Expert

Security Operations

Incident Response· ExpertThreat Hunting· ExpertMalware Analysis· ExpertPhishing Investigation· ExpertIOC Analysis· Expert

Tools & Platforms

ServiceNow· AdvancedVirusTotal· AdvancedHybrid Analysis· AdvancedAbuseIPDB· AdvancedOSINT Tools· Advanced

Certifications

Microsoft Security Operations Analyst (SC-200)

Microsoft

Cyber Reason Certified Administrator Support

Cybereason

KEY RESPONSIBILITIES & ACHIEVEMENTS

Managed enterprise endpoint security using Microsoft Defender for Endpoint and CrowdStrike Falcon.

Conducted real-time threat analysis using OSINT and malware analysis tools.

Investigated phishing incidents and endpoint compromises.

Correlated EDR and SIEM data to identify attack patterns.

Reduced false positives through tuning of security policies and alerts.

Supported compliance audits and security assessments.