Experienced SOC Analyst specializing in threat detection, incident response, and security operations. Proficient
in utilizing tools such as Splunk, Elastic, and CrowdStrike, as well as implementing frameworks like MITRE
ATT&CK and the Cyber Kill Chain. Skilled in developing actionable threat intelligence to enhance detection
and response capabilities. Demonstrated ability to effectively manage security tools, analyze incidents in
high-pressure environments, and ensure compliance with policies and standards. Recognized for strong
analytical skills, effective communication, and a results-driven approach to strengthening organizational
security and Receptionist experience.
Optimized threat response efficiency through proactive threat hunting and real-time incident triage,
leveraging advanced capabilities of Splunk, Elastic, and CrowdStrike.
•
Minimized incident resolution times by designing and implementing actionable Splunk alerts aligned with
MITRE ATT&CK and Cyber Kill Chain frameworks for precise threat detection and mapping.
•
• Boosted threat detection accuracy by conducting weekly threat hunts and performing in-depth root cause
PROFESSIONAL SUMMARY
SKILLS
WORK HISTORY
analysis, utilizing Elastic and CrowdStrike for comprehensive endpoint visibility.
Refined SOC playbooks by integrating actionable insights derived from Splunk, Elastic, and CrowdStrike
data, streamlining incident response protocols.
•
Delivered advanced training sessions on Splunk dashboards and CrowdStrike functionalities, elevating
team proficiency and operational readiness.
•
Conducted meticulous analysis of malicious files and documents, achieving industry-leading accuracy in
threat identification using CrowdStrike and Elastic sandboxing tools.
•
Strengthened security risk management processes by implementing robust monitoring practices with
Splunk and CrowdStrike, significantly reducing vulnerability exposure.
•
Contained threats effectively by leveraging CrowdStrike EDR solutions, resulting in faster response times
and minimized impact.
•
Facilitated incident response preparedness through tabletop exercises, enriched by detailed visualizations
created with Splunk and Elastic.
•
Fortified system defenses by leveraging Elastic and CrowdStrike tools to detect and mitigate advanced
"living off the land" attacks.
•
Spearheaded enhancements to SOC workflows using Splunk and Elastic, increasing alert-handling
efficiency and team productivity.
•
Reduced false positive rates by fine-tuning Splunk and Elastic monitoring rules, ensuring precise detection
and actionable alerts.
•
Successfully led the implementation of a Splunk SIEM solution, enabling the organization to strengthen its
threat detection and response capabilities.
•
Maintained comprehensive documentation of SOC activities, promoting knowledge sharing and
operational continuity, supported by actionable data insights from Splunk, Elastic, and CrowdStrike.