
Dynamic IT Security Analyst with a proven track record in threat hunting and incident response, achieving a remarkable reduction in investigation time by over 70%. Expertise in automating workflows using Python, PowerShell, and Golang enhances security monitoring capabilities. Over 5 years of hands-on experience supporting and advancing enterprise security programs across cloud, on-premises, and corporate IT environments, with a strong foundation in identity and access management, governance, risk, and compliance (GRC), and security automation. Skilled in collaborating with engineering and business teams to effectively manage third-party risk while ensuring audit-ready documentation in regulated environments. Experienced with network security and vulnerability management. Utilizes advanced threat detection techniques to safeguard data integrity. Track record of implementing effective security measures and incident response strategies.
• Perform continuous threat hunting across EDR, DLP, identity, network, and cloud telemetry.
• Design and maintain Python and PowerShell automation to enrich alerts, collect audit evidence, and reduce investigation effort by 70%+.
• Support Identity and Privileged Access Management (IAM/PAM) controls, including access reviews, role validation, and investigation of anomalous authentication and privileged activity.
• Conduct breach and attack simulation exercises to validate detection coverage and response effectiveness across endpoint, identity, and cloud controls.
• Contribute to Governance, Risk, and Compliance (GRC) activities by supporting ISO 27001, NIST, and GDPR-aligned controls, evidence collection, and control documentation.
• Perform vendor and third-party risk assessments, reviewing security questionnaires, validating controls, and documenting risk decisions and remediation plans.
• Partner with engineering and IT teams to improve logging pipelines, CI/CD security visibility, and audit trail completeness.
• Develop agentic AI-driven workflows to assist with alert triage, signal enrichment, risk context gathering, and investigative decision support.
• Lead investigations end-to-end, including scoping, forensics, documentation, and cross-team communication.