
As a cybersecurity expert with a specialization in Microsoft security technologies like Azure Sentinel and Defender, I have a robust background in network security. My proficiency in Python scripting enhances my ability to automate security operations, including the creation of effective security playbooks for incident response. My professional experience includes roles such as Senior Security Analyst and SOC Analyst 24x7, where I have effectively monitored, analyzed, and neutralized network threats. I am skilled in incident response, threat actor analysis, and the development of vulnerability reports. I possess strong communication skills, capable of conveying complex information to both technical and executive teams. Committed to staying on-call 24/7, I ensure rapid response to security events. Holding a Master's in Cybersecurity, I am always updating my skills to meet the evolving challenges in the field. Eligible to work in the US without sponsorship, I bring enthusiasm and meticulous attention to detail to every aspect of my work.
Security Intelligence and Threat Mitigation: Kept up-to-date with emerging vulnerabilities and attacker tactics, techniques, and procedures (TTPs), developing measures to protect systems against threats.
Incident Response and Collaboration: Played a crucial role in the incident response process, collaborating with cross-functional teams to quickly address security incidents and minimize impact.
Security Analysis Using Splunk: Leveraged Splunk for in-depth security analysis, aiding in proactive threat hunting and incident remediation.
SOC Trend Identification and Issue Resolution: Identified and analyzed trends within the Security Operations Center, resolving customer complaints effectively across various systems and time zones.
Achievements:
Innovative Use of Splunk: Pioneered the use of Splunk in security analysis, enhancing threat detection and response capabilities, and contributing to a 25% reduction in unresolved security events.
Effective Promo Code Management: Streamlined the process of promo code decryption and distribution, enhancing operational efficiency and frontline team satisfaction.
Cross-Departmental Collaboration Success: Fostered strong collaboration between the Marketing, Care, and Tech teams, leading to a 10% increase in the efficiency of offer rollouts and communication.
Product Improvement Contributions: Provided key insights that led to significant product improvements, resulting in a 20% decrease in recurring tech
· Collected and analyzed suspicious activities alerts using IPs and URLs.
· Reviewed reputation and made decisions to allow/block IP addresses and URLs.
· Actively participated in meetings related to clients' data security.
· Continuously learned new concepts in cybersecurity.
· Provided security monitoring and rapid response for the SOC.
· Monitored, analyzed, and responded to security events, alerts, and incidents.
· Demonstrated hands-on experience with SIEM, EDR, and Email Security.
· Maintained records of security monitoring and incident response activities.
· Documented security processes and procedures.
· Performed log file analysis to identify potential threats.