SOC Analyst · Available for opportunities

Bhuvantej Ramachandra Reddy

Cybersecurity Analyst | SOC | Threat Detection | Security Automation

Defending enterprises through 24/7 SIEM monitoring, intelligent SOAR automation, and proactive threat hunting — turning thousands of alerts into actionable intelligence.

~/stack $_
Bhuvantej Ramachandra Reddy — Cybersecurity Analyst
● ONLINE
2+ Years
Cybersecurity Experience
1000+
Daily Alerts Analyzed
25%
MTTR Reduction

// WHO_AM_I.TXT

Defender by trade. Analyst by mindset.

I build, tune, and operate detection pipelines that turn noise into signal.

I'm a Cybersecurity Analyst with over two years of hands-on experience in Security Operations Center (SOC) environments, where I've defended enterprise infrastructure against a continuously evolving threat landscape.

My day-to-day spans SIEM-driven threat detection, triaging high-volume alerts across SIEM and EDR platforms, building SOAR playbooks that automate repeatable response tasks, and collaborating with IR teams to contain incidents quickly. I've reduced MTTR by 25% through automation and improved triage efficiency by 40% by streamlining vulnerability workflows.

I lean on industry frameworks like NIST CSF, MITRE ATT&CK, and CIS Controls to anchor every decision — from detection-engineering rules to incident-response playbooks. I'm always sharpening my craft across cloud security, scripting, and adversary simulation.

2+ years

SOC experience

Splunk · QRadar · CrowdStrike

Daily-driver tools

NIST · CIS · MITRE ATT&CK

Frameworks applied

Education

Aug 2024 – Feb 2025

Master of Science in Cybersecurity

University at Buffalo (SUNY), Buffalo, NY

GPA: 3.78 / 4.0

Aug 2019 – May 2023

Bachelor of Technology in Computer Science & Engineering

PES University, India

GPA: 3.0 / 4.0

// CAREER.LOG

Frontline of enterprise defense.

From global consulting at EY to hands-on SOC monitoring — engineered measurable impact at every step.

Cybersecurity Analyst

Community Dreams Foundation

Feb 2026 – Present

Sebring, Florida

  • Monitored 800+ weekly SIEM alerts (Splunk), escalating high-risk incidents.
  • Optimized 100+ user access controls, improving security and compliance posture.
  • Conducted vulnerability assessments (OpenVAS), identifying 30+ critical issues.
  • Improved reporting and response workflows, reducing coordination time by 30%.

Associate Cybersecurity Consultant

Ernst & Young (EY)

Jul 2023 – Jul 2024

Bengaluru, Karnataka, India

  • Built SOAR playbooks reducing MTTR by 25%.
  • Analyzed 1000+ daily SIEM alerts.
  • Automated vulnerability workflows (40% efficiency gain).
  • Improved incident response coordination by 30%.
  • Used MITRE ATT&CK & NIST frameworks throughout investigations.

Cybersecurity Intern

Netcon Technologies

Jul 2022 – Jul 2023

Bengaluru, Karnataka, India

  • Monitored 500+ weekly alerts using Wazuh SIEM.
  • Investigated 200+ security events end-to-end.
  • Conducted vulnerability assessments with Nessus and OpenVAS.
  • Reduced recurring misconfigurations by 20%.

// ARSENAL.JSON

Technical Stack

Tools, frameworks and languages I rely on day-to-day in the SOC.

SOC & Automation

  • SIEM: Splunk, QRadar, Wazuh
  • SOAR: Google SecOps, Securaa
  • EDR: CrowdStrike, Microsoft Defender, SentinelOne

Network Security

  • Firewalls
  • TCP/IP
  • DNS
  • IDS/IPS
  • VPN
  • Active Directory

Penetration Testing

  • Kali Linux
  • Burp Suite
  • Wireshark
  • Metasploit
  • OWASP ZAP

Frameworks

  • NIST CSF
  • MITRE ATT&CK
  • CIS Controls
  • OWASP Top 10
  • PCI DSS

Programming & Scripting

  • Python
  • SQL
  • JavaScript
  • Bash
  • PowerShell

Cloud Security

  • AWS
  • Azure
  • IAM
  • Docker
  • MFA
  • RBAC

// SERVICES.YAML

What I deliver.

SOC Monitoring & Threat Detection

24/7 SIEM-driven detection, triage, and escalation across hybrid environments.

Incident Response Support

Containment, eradication, and recovery aligned with the NIST IR lifecycle.

Security Automation (SOAR)

Playbook design that cuts MTTR and standardizes analyst workflows.

Vulnerability Management

Scanning, prioritization, and remediation tracking using OpenVAS and Nessus.

Certifications

// REPO.LIST

Selected Projects

Hands-on case studies from detection engineering and offensive security.

Multi-Stage Cyberattack Forensic Analysis using Splunk SIEM

Simulated an enterprise breach scenario and reconstructed the full kill chain using Splunk. Authored advanced SPL queries and dashboards to surface IOCs and the attacker's timeline.

  • Simulated enterprise breach with realistic adversary behavior
  • Developed SPL queries and visualization dashboards
  • Identified IOCs and reconstructed attack timeline end-to-end
SplunkSPLMITRE ATT&CKForensics

Web Application Security Vulnerability Assessment & Mitigation

Conducted offensive security testing against a vulnerable web application — identifying OWASP Top 10 issues and implementing secure-coding remediations.

  • Identified OWASP Top 10 vulnerabilities (SQLi, XSS, Command Injection)
  • Performed manual and automated penetration testing
  • Implemented secure coding practices and input validation
Burp SuiteOWASP ZAPKali LinuxPython

Spear Phishing Using Machine Learning

Built a phishing simulation platform powered by Python Selenium and ML classifiers for template generation and detection. Internationally presented research with Springer publication.

  • Designed automated phishing simulation engine
  • Trained ML models for template generation and classification
  • Springer-published research presented internationally
PythonSeleniumScikit-learnResearch

// CONTACT.SH

Open to opportunities. Let's connect.

Whether you're hiring, collaborating on research, or have a security challenge to discuss — drop a message.