
Senior SOC Manager with 11+ years leading 24/7 security operations, incident response, and threat intelligence. Proven success managing multi‑client environments across healthcare, financial services, telecom, gaming, and aerospace. Design and operationalize IR playbooks and SIEM/EDR strategies to strengthen resilience, cut MTTR, and reduce false positives. CISM/CISSP‑certified; adept with Splunk, QRadar, ArcSight, LogRhythm, Exabeam, CrowdStrike, Proofpoint, and IDS/IPS.
• SOC Strategy & Operations – 12+ years in SOC setup, implementation, and 24/7 operations management
• People Leadership – Building, mentoring, and leading cross-functional, high-performing security teams
• Customer & Stakeholder Management – Driving client satisfaction, handling escalations, and building trusted partnerships
• SIEM & SOAR Expertise – Design, deployment, governance, and optimization of detection
rules, correlation logic, and playbooks
• Incident Response & Threat Management – Proven expertise in threat detection,
vulnerability management, and automated response
• MSSP Service Delivery – Onboarding, customizing services, and ensuring SLA/KPI
adherence for global customers
• Strategic Planning & Governance – Aligning security initiatives with business goals, setting KPIs, and ensuring compliance
• Budget & Vendor Oversight – Security budgets, vendor relationships, and third-party risk management
• Cross-Functional Collaboration – Partnering with IT, Cloud, Engineering, and Product teams to enhance security posture.
Responsibilities:
· Led SOC team in monitoring security incidents and alerts.
· Developed incident response plans to address potential threats.
· Coordinated with IT departments to enhance cybersecurity measures.
· Conducted regular security assessments and vulnerability scans.
· Trained staff on security protocols and incident reporting processes.
· Managed security tools like SIEM, IPS/IDS, EDR/XDR, Proofpoint for real-time threat detection.
· Collaborated with vendors for security solutions and software updates.
· Analyzed threat intelligence to identify emerging risks and trends.
· Conducted regular audits of network devices for vulnerabilities and threats.
· Provided technical support for network infrastructure configurations associated with security technologies.
· Managed the development, implementation and maintenance of security policies, standards, guidelines and procedures.
· Tracked identified risks and reported findings to executive management team.
· Conducted forensic analysis following an incident involving loss or compromise of data.
· Implemented measures to prevent unauthorized access to sensitive data and systems.
· Provided guidance on how best to respond when a breach is suspected or confirmed.
· Responded promptly to alerts generated by intrusion detection systems or other monitoring tools.
· Assisted in the development of training programs related to information security topics.
· Performed risk assessment activities for new technologies and services prior to deployment into production environment.
· Monitored security access to ensure compliance with corporate security policies.
· Investigated incidents related to suspicious or malicious activity on networks, systems and applications.
· Coordinated with internal teams on developing solutions that comply with organizational information security requirements.
· Developed incident response plans to address potential security issues.
· Maintained documentation of security and disaster recovery policies and procedures.
· Directed risk assessment operations and system test execution.
· Evaluated performance indicators to assess security control quality.
· Overseeing SOC Team operations effectively.
· Defining process and procedures for CSIRT.
· Creation of Playbooks, SOP's and other process documents.
· Timely delivery of reports, Incident response and been point of contact of client
escalations
· SIEM Administration, Integrations, Fine tuning, Troubleshooting, Creating Use cases, Health Check, Reporting
· Part of a esteemed driven SOC Team managing SOC Monitoring and SIEM Administration involves integrations, troubleshooting, SIEM Health Check, Reporting.
· Classify incidents in case of high severity cases refer to management Security Operation Centre(SOC).
· Comprehensive experience achieved working for an Asia-pacific leading sectors responsible for Security Operations.
24/7 Incident response, RCA, Reporting and engaging with customers w.r.t theats identified.
SIEM - IBM Qradar, ArcSight, LogRhythm, Splunk, Exabeam
Vulnerability Assessment - Qualys, Nessus
EDR/XDR
Database Access Moniorting
IPS/IDS - FireEye
Proofpoint- Email
Certified Information Security Manager- CISM
Certified Information System Security Professional - CISSP
Information Technology Infrastructure Library- ITIL
Certified Ethical Hacker- CEH
Security +