SOC Analyst · 2.5+ Years Security Operations
SOC Analyst · MSc Cyber Security
SOC Analyst with 2.5+ years of experience in Security Operations Centers across banking, aviation, and telecommunications environments.
Experienced in SIEM monitoring, incident investigation, threat detection, and network traffic analysis using tools such as IBM QRadar, McAfee SIEM, Azure Sentinel, and CrowdStrike.
Skilled in log analysis, DDoS detection, and security incident response to support effective threat mitigation. Currently completing MSc in Cyber Security at University of Hertfordshire — seeking SOC Analyst roles in the UK.
Scenario: Security analysts spend excessive time manually parsing threat intelligence from varied sources.
Goal: Centralize 100+ RSS feeds to provide real-time, triaged threat intelligence.
Actions: Engineered a React/TypeScript dashboard with a SQLite backend. Built automated threat severity classification using keyword-based analysis and automated critical-alert email reporting.
Outcome: Delivered a centralized intelligence platform with interactive visualizations, reducing manual monitoring efforts.
Scenario: Unmanaged personal devices in corporate environments introduce severe access risks.
Goal: Design an access control system to securely authenticate and isolate BYOD endpoints.
Actions: Developed a framework using AES-128 encryption and UUID-based authentication. Integrated ML and CNN-based facial recognition to detect anomalies.
Outcome: Created a zero-trust model prototype that prevents unauthorized network access from compromised personal devices.
Scenario: Threat hunting requires checking numerous external IP reputation lists, consuming valuable triage time.
Goal: Automate IP enrichment to quickly determine the severity of a suspicious IP.
Actions: Developed a Python script integrating APIs (VirusTotal, AbuseIPDB, AlienVault OTX) and dark-web OSINT.
Outcome: Automatically generated hashes, geolocation, and severity scoring into an analyst-ready threat summary.
Scenario: Manual triage of noisy, unparsed SIEM alerts leads to alert fatigue and high MTTR.
Goal: Automate log parsing to extract actionable indicators from raw logs.
Actions: Wrote Python scripts to parse log formats and highlight critical fields.
Outcome: Integrated the pipeline with the SIEM, reducing manual triage time and improving SOC efficiency.
Scenario: Standard email security filters often miss sophisticated, targeted phishing attacks and zero-day malicious URLs, leaving inboxes vulnerable.
Goal: Develop an automated email analysis engine to proactively detect, score, and quarantine complex phishing attempts.
Actions: Built a Python application that fetches real-time emails via IMAP and performs deep header forensics (SPF/DKIM/DMARC checks). It cross-references extracted URLs and IPs against 100+ global Cyber Threat Intelligence (CTI) feeds and leverages the Gemini AI API for deep, contextual analysis of borderline suspicious emails.
Outcome: Created a robust pipeline that automatically scores incoming emails, accurately flags advanced tactics like display name spoofing and lookalike domains, and automatically quarantines malicious messages with high accuracy.
Scenario: Routine vulnerability assessments involve running fragmented tools manually, causing reporting delays.
Goal: Create a lightweight, unified scanning tool to streamline basic reconnaissance.
Actions: Built a Bash CLI tool on Kali Linux orchestrating Nmap, Nikto, and Metasploit auxiliary modules.
Outcome: Consolidated scan outputs into structured HTML reports, improving assessment speed and repeatability.
Microsoft · Aug 2021
Cybrary · Sep 2021
IBM · Aug 2021
Red Hat · Aug 2021
Air Arabia (ISA) · 2023
Sri Lanka Scout Association · 2019
Preparing for SOC 200 certification with a focus on advanced SOC operations, security monitoring, incident handling, threat detection, and real-world SIEM workflows.
Actively following the TryHackMe SOC Learning Path with daily hands-on practical labs, focusing on SIEM alert analysis, log investigation, threat detection, and incident response in real-world SOC scenarios.
Implementing and testing Wazuh security policies using Kali Linux, including log analysis, rule tuning, agent configuration, and threat detection use cases.
Designing and building a custom SOC lab environment on Kali Linux, integrating SIEM, endpoint monitoring, threat simulation, and incident response workflows for hands-on SOC practice.
University of Hertfordshire — School of Physics, Engineering & Computer Science, UK
📅 2024 – 2025 · Accredited by BCS, The Chartered Institute for IT
Sri Lanka Institute of Information Technology (SLIIT) — Faculty of Computing
📅 2020 – 2024 · Specializing in Cyber Security
I'm actively looking for SOC Analyst opportunities in the UK. Whether you're a recruiter, a hiring manager, or a fellow security professional — feel free to reach out!
Hemel Hempstead, HP2 4JL, UK