Senthuran Sritharan
Learner
(1)
32
Location
Toronto, Ontario, Canada
Bio

πŸ” I’m a Tier 1 SOC Analyst at ISA Cybersecurity, actively triaging 30–60 tickets daily across IBM QRadar, SentinelOne, and Trellix platforms.

πŸš€ Certified in Threat Hunting, Endpoint Administration, and Palo Alto Cybersecurity Fundamentals, I specialize in identifying threats, escalating incidents, and reducing false positives to improve security posture.

πŸ“• Currently pursuing my diploma in Computer System Technologies (Networking & Cybersecurity) at Seneca College, I’m passionate about Blue Team operations, threat detection, and protecting organizations against evolving cyber threats.

πŸ”Ή SIEM | EDR | XDR | MITRE ATT&CK
πŸ”Ή 24/7 SOC Operations | Incident Triage | Malware Containment

Let’s connect if you're passionate about cybersecurity, SOC operations, and continuous learning!

Portals

Skills

Cyber security 2 Data analysis 2 Leadership 2 Marketing 2 Market research 2 Prioritization 2 Return on investment 2 Strategic planning 2 Strategic prioritization 2

Socials

Achievements

Latest feedback

Recent projects

Work experience

Cybersecurity analyst
ISA Cybersecurity
Toronto, Ontario, Canada
October 2025 - Current

- Triaged 30–60 tickets daily using IBM QRadar, identifying threats from log data across multiple client environments.

- Used SentinelOne to monitor endpoint behaviour, configure exclusions, and isolate compromised systems.

- Leveraged Trellix XDR to analyze correlated threat events across email, endpoint, and network vectors.

- Applied MITRE ATT&CK techniques to assess and escalate incidents, reducing false positives through tuning initiatives.

- Operated in a 24/7 SOC shift rotation and collaborated with Tier II teams for high-severity threat cases.

- Triaged 30–60 tickets daily using IBM QRadar, identifying threats from log data across multiple client environments.

- Used SentinelOne to monitor endpoint behaviour, configure exclusions, and isolate compromised systems.

- Leveraged Trellix XDR to analyze correlated threat events across email, endpoint, and network vectors.

- Applied MITRE ATT&CK techniques to assess and escalate incidents, reducing false positives through tuning initiatives. - Operated in a 24/7 SOC shift rotation and collaborated with Tier II teams for high-severity threat cases.

Technical Support Engineer & Network Analyst Intern
Noki Systems Inc
Toronto, Ontario, Canada
August 2024 - January 2025

- Troubleshoot and resolve over 3 systems per week, achieving a 95% first-contact resolution by mastering remote desktop support tools.

- Led the deployment and configuration of systems on the cloud, managing the full lifecycle from testing to production launch, ensuring seamless transitions and minimizing downtime.

- Configured Raspberry Pi 4 and CM4 modules for diverse applications, including Wi-Fi, LTE, and hardware performance optimization, conducting rigorous electrical and system testing.

- Monitored cloud systems and networks for anomalies, identifying and diagnosing issues related to power, battery, network, and software.

- Collaborated closely with software engineers, assisting with test executions and escalating complex software issues for resolution.

Education

Computer System Technology, Information Technology
Seneca College
September 2023 - December 2025