Narendran G

SOC Analyst • Incident Response • Threat Monitoring

📄 Download Resume

About Me

I’m an aspiring SOC Analyst with strong foundations in monitoring, threat detection, and incident response. I specialize in log analysis, SIEM dashboards, and handling alerts to reduce false positives and escalate true incidents effectively. With experience in vulnerability management, network traffic analysis, and secure coding, I bring both a proactive and defensive approach to security operations.

I hold certifications such as Fortinet Certified Fundamentals Cybersecurity, Azure AI Fundamentals, and Qualys Specialist in Cybersecurity Asset Management, which complement my hands-on practice on platforms like Splunk, TryHackMe, and Burp Suite.

My goal is to contribute to a SOC team by strengthening monitoring, automating alert handling, and improving response workflows — aligning with Zoho’s vision of building resilient security infrastructures.

Skills

SIEM (Splunk, ELK)
Log Analysis
Incident Response
Network Traffic Monitoring
Threat Intelligence
Burp Suite & Wireshark
Qualys VM
Azure Security
Python Automation

Projects

SOC Log Monitoring Dashboard

Built a Splunk dashboard to detect brute-force attempts, failed logins, and anomalies in authentication logs. Automated alert rules to reduce response time.

KeyShield – Keylogger Detector

Python + Flask tool to detect hidden keyloggers, integrated with logging to trigger alerts in a SIEM-like environment.

🔗 GitHub
Network Anomaly Detection

Implemented ML-based anomaly detection to identify unusual traffic flows and potential insider threats in monitored logs.

Contact