KS

Khaja sayed

SOC Analyst

Riyadh, Saudi Arabia

Work Experience

  • SOC Analyst

    Centillion Networks

    Mar 2021 - Feb 2025 -3 yrs, 11 months

    Saudi Arabia

    • Job Details:Using IBM QRadar for monitoring and analyzing alerts triggered by security, network and databases. Creating and checking dashboards and offenses daily analyzing and raising incidents for suspicious activities. Good knowledge on end point tools. Analysis of malicious threat files and taking corrective and preventive actions. Analysis of phishing mails and taking necessary actions creating tickets in ServiceNow and working with different teams. Updating and resolving the tickets on a regular basis within SLA. Knowledge on IPS to detect and prevent threat signatures. Analyzing the suspicious signatures and blocking them whenever required. AWS GD for cloud security. Monitoring the alerts from cloud instances and acting accordingly. Running scans using Qualys for the assets and reporting the pending vulnerabilities. Knowledge on McAfee AV for detecting the suspicious/malicious files from end machines. Monitoring Zscaler proxy for URL's access made and verifying the patient 0 alerts triggered for suspicious file downloads.
  • Network Engineer

    STC

    Jun 2016 - Nov 2020 -4 yrs, 5 months

    Saudi Arabia

    • Job Details:Perform responsibilities designing of FTTX/GPON and none GPON networks. Having depth knowledge about read fundamental network planning, route selection, presenting fiber connections in FJS, design BOQ using with ISOW. Designing of OSP network and generate schematic drawings from NE database. Designs are issued based on STC standards. Hands on work experience with latest version of Telcordia network engineer, Arc Map, ISOW and AutoCAD map. Good experience in fiber telecom network (as-built in civil & fiber) design and having depth knowledge about fiber telecom network domain. Digital conversion of maps/images by using AutoCAD and GIS software. Data conversion: raster data to vector data and other various GIS based data formats.
  • Skills

    • Incident Management
    • Cloud Security
    • Phishing Analysis
    • Vulnerability Assessment
    • SIEM (IBM QRadar)
    • Endpoint Security
    • EDR (Crowd Strike Falcon)
    • Proxy (Zscaler)
    Share this Profile