Cybersecurity professional with 5+ years of experience in Security Operations Center (SOC) management, incident response, threat intelligence, and digital forensics. Skilled in SIEM (Splunk, QRadar, ArcSight), EDR/XDR, SOAR, malware analysis, IDS/IPS tuning, and compliance frameworks. Holds CEH and Splunk Core User certifications. Proven ability to lead teams, automate threat detection processes, and enhance security posture through AI-driven solutions. Passionate about building resilient cybersecurity operations through automation and AI-driven threat mitigation.
Overview
7
7
years of professional experience
1
1
Certification
Work History
Cyber Security Engineer
Verizon Communications
02.2025 - Current
Security incident triage and response for Verizon's global infrastructure across hybrid cloud and enterprise environments.
Implemented advanced threat detection using Splunk ES and integrated TIPs (MISP, ThreatConnect) for correlation.
Conducted threat hunting exercises using MITRE ATT&CK mapping across Windows and Linux endpoints.
Collaborated with vulnerability management team to align detection rules with high CVSS-score exploits.
Developed automated playbooks using Phantom/XSOAR for phishing, malware containment, and IOC lookups.
Fine-tuned behavioral analytics rules (UEBA) for detecting anomalous logins, privilege abuse, and data movement.
Investigated and responded to alerts triggered by DLP, EDR, CASB, and Microsoft 365 Defender.
Created weekly executive dashboards detailing incident trends, false positive rates, and response metrics.
Participated in red/blue team engagements and managed post-attack cleanup with forensic reports.
Onboarded 30+ log sources into Splunk and QRadar, ensuring normalized parsing and correlation integrity.
Liaised with Verizon's global cybersecurity operations and GRC teams to align with ISO 27001, NIST 800-53, and SOX compliance.
Designed and conducted SOC maturity assessments to identify gaps in detection, response, and containment workflows.
Worked on integration of Azure Sentinel with external data sources and ensured correct KQL rule writing for threat detection.
Developed honeypots to study attacker behavior and feed threat intelligence pipelines.
Led automation of phishing investigation lifecycle using regex parsing and sandbox integrations.
Maintained and updated incident response playbooks based on evolving threat landscape and Verizon-specific threat models.
Created and managed indicators of compromise (IOCs) repository, enabling faster correlation in future incidents.
Assisted Verizon teams during tabletop exercises and helped simulate APT-style attack scenarios for executive training.
Reviewed and validated endpoint security policies, ensuring alignment with SOC visibility requirements and zero trust principles.
Coordinated with law enforcement and third-party forensic vendors during post-breach investigations.
Delivered internal training to SOC analysts on cloud-native threat hunting using Azure and AWS logs.
Assistant Manager – Security Operations Center (SOC)
Deloitte | Client: Leading Global Banking & Financial Organization
01.2024 - 06.2024
Led a 24/7 SOC team of 8 analysts for a global bank (50,000+ employees), ensuring real-time threat detection, triage, and resolution.
Acted as incident commander for critical ransomware and insider threat cases; minimized business disruption with zero downtime.
Developed Python-based SOAR playbooks for alert enrichment, isolation, and auto-containment — reducing MTTR by 35%.
Directed full-scope digital forensic investigations, establishing root causes and enhancing detection rules.
Authored executive-level threat reports and threat intelligence briefs presented to the CISO and Board.
Maintained compliance with NIST CSF, MITRE ATT&CK, and CIS benchmarks.
Mentored junior SOC analysts in log analysis, correlation, triage, and threat hunting best practices.
Monitored DLP alerts, CASB violations, and implemented custom data loss signatures.
Designed escalation matrices, shift handover templates, and incident response workflows.
Partnered with threat intelligence vendors to integrate premium feeds into SIEM.
Worked closely with red team to build detection signatures for simulated attack techniques.
Coordinated BCP/DRP simulation exercises and validated SOC resiliency plans.
Improved KPIs for SOC performance, including MTTD/MTTR metrics through automation and alert prioritization.
Developed quarterly SOC performance reviews and maturity roadmap with CISO office.
Led SIEM optimization efforts, including parsing enhancements and correlation rule rewrites for 20+ use cases.
Implemented SOC onboarding checklist for new analysts and shift leads.
Oversaw threat modeling and risk assessments for new business-critical applications prior to go-live.
Cybersecurity Specialist
Cognizant Technology Solutions | Internal SOC
04.2021 - 12.2023
Company Overview: Internal SOC – Corporate IT Infrastructure