
Security Operations and Zero Trust Analyst with hands-on experience reviewing security events, enforcing application control policies, supporting breach investigations, and managing user access in enterprise environments. Skilled in log analysis, incident triage, SIEM tools, and endpoint security, with practical experience using ThreatLocker and Active Directory. Strong understanding of Zero Trust principles and modern security practices.
Splunk SOC Analyst Project — Threat Detection & Incident Response (Dec 2024)
• Identified brute force, web defacement, and CMS exploitation attempts using Splunk dashboards and correlation rules.
• Tracked attacker IPs, malicious file uploads, and MD5 hashes to map adversary behavior.
• Applied the Lockheed Martin Kill Chain to analyze malware downloads, phishing attempts, and lateral movement.
Microsoft Sentinel SIEM Mapping — PowerShell, Log Analysis (Mar 2024)
• Built a vulnerable VM environment to generate global attack telemetry.
• Automated IP extraction from Windows logs using PowerShell and geolocation API integration.
• Visualized intrusion origins in Sentinel and documented alert rules and IR procedures.
Zeus Banking Trojan — Malware Analysis Lab (Apr 2024)
• Performed static and dynamic malware analysis using Procmon, PeStudio, Capa, and Remnux.
• Analyzed file changes, registry activity, and DNS behavior in an isolated malware lab.