Summary
Overview
Work History
Education
Skills
INFORMATION SECURITY COMPETENCIES
Timeline
Generic

Sai Supreeth

Vancouver,Canada

Summary

Cyber security professional with 4+ years of experience in IT Managed Services, SOC, and Cloud Security. Skilled in security risk assessments, evaluating services and technologies, and documenting information security policies and procedures. Proficient in monitoring alerts in cloud environments. Possesses a strong analytical mindset with a focus on identifying and mitigating security risks through both established practices and innovative approaches. Highly organized and dependable candidate excelling at managing multiple priorities with a positive attitude. Demonstrates a willingness to take on additional responsibilities to meet team goals.

Overview

7
7
years of professional experience

Work History

Cyber Security Analyst (L2)

Maze Software
07.2024 - Current
  • Leveraged MS Azure Sentinel and Microsoft Defender for Office 365 to investigate and remediate security alerts, reducing incident response time by 40%
  • Experience with security administration work like managing both Azure Active Directory(Entra ID) and On-prem AD.
  • Experience with Azure Sentinel for collection with data connectors, monitoring key metrics and better threat hunting.
  • Performing Realtime Monitoring, Investigation, Analysis, Reporting and Escalations of Security Events from Multiple log sources.
  • Monitoring the customer network traffic using IBM QRadar SIEM Tool & FIM Console.
  • Utilized Defender for Endpoints/Clouds to contain threats, achieving a 65% resolution rate on endpoint-related alerts.
  • Preparation of Daily BAU Meetings & Prepare MOM (Minutes of meetings).
  • Maintain keen understanding of evolving internet threats to ensure the security of client Networks.
  • Escalated and analyzed atleast 25+ priority incidents/month, providing actionable recommendations that reduced repeated attack vectors by 12%
  • Directly assisted customers in 10+ P1 incident scenarios, enabling quicker containment through guided mitigation efforts and proactive follow-ups.
  • Reviewed 25+ SOC incident tickets/month, collaborating with analysts to contain and eradicate threats within SLA-defined windows
  • Troubleshooting SIEM dashboard issues when there are no reports getting generated or no Data available. Determine the scope Incident and its potential impact to Client network Recommend steps to handle the security incident with all information and support security events.
  • Authored 15+ SOPs and runbooks, standardizing response playbooks and enhancing response consistency across SOC shifts.
  • Maintain & document the application support strategy. Perform incident monitoring, response, triage and initiate investigations.
  • For better investigation, I have worked on Powershell scripts and KQL queries to gather records in seconds.
  • Investigated over 300 phishing cases/quarter, recommending domain/IP blocking that led to atleast 35% drop in successful email-based attacks.
  • Escalating cases to L3, Users, Device Owners, and OEM as per case requirements & Severity.
  • Works on Daily Threat Advisory report and adds IOCs to watch list and also blocks the IOC's in Forcepoint portal if found to be malicious.

Cyber Security Analyst

Inventurus Knowledge Solutions
01.2019 - 01.2023
  • Monitored and analyzed logs using Splunk to detect abnormal access patterns, failed login attempts, and suspicious file movements as part of proactive threat detection.
  • Utilized Microsoft Defender for Endpoint to identify and investigate malware activity, suspicious behavior, and attempted breaches on endpoint devices.
  • Correlated healthcare operations experience with cybersecurity alerts to prioritize and respond to incidents involving sensitive medical and financial systems.
  • Performed threat hunting activities to identify potential indicators of compromise (IoCs) in claims processing systems and internal databases.
  • Assisted in developing incident response playbooks, leveraging healthcare operational knowledge to simulate realistic phishing, ransomware, and data exfiltration scenarios.
  • Analyzed user behavior and access logs to detect insider threats and policy violations related to patient record access or unauthorized financial data retrieval.
  • Created reports and dashboards in Splunk to visualize security metrics, such as endpoint vulnerabilities, policy violations, and event trends.
  • Collaborated with compliance and privacy teams to align security monitoring with healthcare regulations (HIPAA, HITECH), ensuring that SOC activities support legal and audit requirements.
  • Triage and document investigations and incidents within The Hive, and/or ServiceNow.
  • Conducted training sessions for non-IT staff to raise awareness about phishing emails, social engineering tactics, and safe data handling practices.
  • Delivered simulated phishing campaigns and analyzed user response to improve employee awareness and reduce click rates over time.

Education

Master's Degree in Business Administration (M.B.A) -

University Canada West
Vancouver, BC, Canada
06.2024

Bachelor's Degree in Commerce -

Bhavan's Vivekananda Degree College
Hyderabad, Telangana, India.
04.2019

Skills

  • SIEM Tools: Splunk, Arc-Sight, LogRhythm, Azure Sentinel, Elastic search, Exa beam Analytics,IBM QRadar
  • XDR Tools: Palo alto Cortex
  • Vulnerability Assessment Tools Nessus, Qualys
  • Operating systems: Windows, Kali Linux, Mac-OS, Ubuntu
  • EDR Tools: Crowd-Strike, MS Defender, Sentinel-One
  • OSINT Tools: Virus Total, Abuse Ip, any run, Cisco Talos, Hashkillerio, Who is lookup, Urlscanio
  • Programming Languages: Python fundamentals
  • AWS: EC2, IAM, Cloud formation, S3, Cloud watch, Cloud trial, AWS shield

INFORMATION SECURITY COMPETENCIES

  • Good understanding of network and security protocols such as TCP/IP, UDP, HTTP, HTTPS, DHCP, DNS.
  • Experienced in Vulnerability Management, Assessment, and exposure to CVE, CVSS.
  • Knowledge in Security Technologies includes: -IDS/IPS, Web-filtering, Mobile Device Management Anti-Malware.
  • Profound Knowledge of OWASP's top 10 Vulnerabilities.
  • Knowledge of IAM, Privilege Access Management (PAM) and utilizing Active directory services in Azure and windows.
  • Exposure to MITRE ATT&CK and CYBER KILL CHAIN Frameworks.
  • Knowledge of Security standards and methodologies such as ISO 27001, PCI DSS, HIPAA.
  • Knowledge of Privacy legal and regulatory compliance requirements such as PIPA and PIPEDA.

Timeline

Cyber Security Analyst (L2)

Maze Software
07.2024 - Current

Cyber Security Analyst

Inventurus Knowledge Solutions
01.2019 - 01.2023

Master's Degree in Business Administration (M.B.A) -

University Canada West

Bachelor's Degree in Commerce -

Bhavan's Vivekananda Degree College
Sai Supreeth