[SOC ANALYST] — PUNE, INDIA

MAYUR MAHAJAN

Cybersecurity Analyst  |  SOC L1/L2  |  Incident Response  |  SIEM  |  Threat Hunting

View Experience Get In Touch
SEC

WHO AM I

I'm a Cybersecurity Analyst with 2+ years of hands-on experience in SOC operations, phishing analysis, malware investigation, and incident response.

Currently working on the Microsoft Anti-Phishing project at LTIMindtree, contributing to enterprise-scale email and URL threat detection using SIEM platforms — Splunk, IBM QRadar, and Azure Sentinel.

My expertise spans the full incident lifecycle: detection, triage, investigation, containment, and documentation. Proven track record of reducing false positives by ~20–25% and blocking 100+ malicious URLs monthly.

I operate using MITRE ATT&CK and OWASP Top 10 frameworks, actively upskilling for SOC L2 and SIEM-focused roles.

2+
Years Experience
60+
Daily Alerts Handled
~25%
False Positive Reduction
100+
Malicious URLs Blocked/Mo

TECHNICAL ARSENAL

skills.sh — security_ops
Security Operations
SOC L1/L2 Alert Triage Incident Response Threat Hunting Phishing Analysis Malware Analysis
SIEM Platforms
Splunk QRadar Azure Sentinel Microsoft Defender
Frameworks
MITRE ATT&CK OWASP Top 10
tools.sh — toolset
Analysis Tools
Wireshark Burp Suite VirusTotal Hybrid Analysis Nmap
Networking
TCP/IP DNS IDS/IPS VPN Log Analysis
Ticketing / Process
ServiceNow OSINT IOC Identification SOP / SLA
Platform & Tool Badges
SIEM Platforms
SPLUNK
Splunk
IBM QRadar
QRadar
SENTINEL
Azure Sentinel
MS Defender
Analysis Tools
Wireshark
BURP SUITE
Burp Suite
Nmap
VirusTotal
Hybrid Analysis
Frameworks
MITRE ATT&CK
MITRE ATT&CK
OWASP TOP 10
OWASP Top 10

MISSION LOG

LTIMindtree
Mar 2023 — Present  ·  2 yrs 1 mo
Cybersecurity Analyst Full-time
Dec 2024 — Present  ·  Pune
  • Handled 40–60+ security alerts daily — phishing, spam, and malware incidents — across enterprise SOC environments.
  • Performed email header analysis, URL/domain analysis, and sandbox-based malware investigation.
  • Leveraged Splunk, QRadar & Azure Sentinel for SIEM monitoring, threat correlation and investigation.
  • Reduced false positives by ~20–25% through improved detection rules and triage workflows.
  • Blocked 100+ malicious URLs monthly via proactive threat intelligence.
  • Conducted malware analysis using VirusTotal & Hybrid Analysis for static and dynamic assessment.
  • Managed incident tickets in ServiceNow, maintaining SOP/SLA compliance throughout the incident lifecycle.
Cloud Engineer — Cybersecurity Full-time
Jun 2024 — Dec 2024  ·  7 mos  ·  Pune
  • Worked at the intersection of cloud infrastructure and cybersecurity operations.
  • Supported cloud security monitoring and identity protection across Azure environments.
  • Transitioned to dedicated SOC analyst role with strengthened detection and response capabilities.
Graduate Engineer Trainee Trainee
Mar 2024 — Jun 2024  ·  4 mos  ·  Pune
  • Completed LTIMindtree engineering onboarding with cybersecurity domain specialisation.
  • Gained hands-on exposure to enterprise security tooling, SOC workflows and ticketing systems.

FIELD OPS

// Project Alpha — Microsoft
ANTI-PHISHING & URL ANALYSIS FRAMEWORK
Led a comprehensive phishing analysis initiative for Microsoft, covering end-to-end investigation of phishing emails, malicious URLs, and suspicious domains. Employed advanced OSINT techniques combined with static and dynamic analysis to identify, classify, and neutralize phishing threats. Contributed directly to strengthening organizational security posture through systematic IOC reporting and URL blocklisting.
Burp Suite VirusTotal Hybrid Analysis OSINT Email Header Analysis IOC Identification URL Whitelisting / Blocklisting

CLEARED LEVELS

Microsoft Azure AI Fundamentals
Microsoft Certified
Generative AI
Coursera
🐍
Python Programming
Certified
🗄
SQL
Certified
🖥
Full Stack Development Bootcamp
Certified
Decentralized Voting System — Blockchain
Copyright Holder

ACCESS GRANTED

Super Crew Award Badge
SUPER CREW AWARD
iWkn — LTIMindtree
Honored for taking strong initiative and consistently delivering tasks with impeccable accuracy and speed in SOC operations.
Team Player Badge
TEAM PLAYER
LTIMindtree
Formally recognized for collaborative excellence and consistent contribution to team goals within the security operations environment.
Creative Badge
CREATIVE
LTIMindtree
Awarded for bringing creative thinking and innovative approaches to cybersecurity challenges and detection workflow improvements.

ESTABLISH COMMS

Open to new opportunities in cybersecurity, SOC operations, and threat intelligence. Let's connect and talk security.

contact.sh — analyst_profile
whoami
mayur_mahajan :: cybersecurity_analyst

cat status.txt
[✓] Available for SOC L1 / SIEM roles
[✓] Open to Incident Response roles
[✓] Remote & Hybrid friendly

cat contact.txt
📧 mayurmahajan.020@gmail.com
🔗 linkedin.com/in/mayur-mahajan-160b84224

cat skills_summary.txt
SIEM: Splunk | QRadar | Azure Sentinel
Tools: Wireshark | Burp Suite | VirusTotal
Frameworks: MITRE ATT&CK | OWASP Top 10

echo "Let's connect!"
Let's connect! 🔐