Details
Skills
• Network Security
• Endpoint Security
• Splunk (SIEM)
• SIEM deployment and configuration (Microsoft Defender for endpoint, Splunk,)
• Risk Assessment & Management
• Automation: Azure Logic Apps, SOAR, playbooks.
• Cloud Security (M365 Defender).
• Threat Detection, Triage, and Incident Response
• Vulnerability Management
• Active directory configuration and administration
• Identity and access Management
• Security Education and awareness
• SSH setup and remote access
• Hardening
• SIEM & SOAR Management (Splunk, Azure Sentinel)
• Vulnerability & Risk Management
• Security Tools: Defender for Cloud, Microsoft Sentinel, Wireshark.
• Email Analysis
• Cloud Platforms: Microsoft Azure
• Languages/Scripting: PowerShell, Bash, Python.
• Azure IAM, RBAC, and Conditional Access
• Compliance: NIST, ISO 27001, GDPR
• Scripting & Automation (PowerShell, KQL, Logic Apps)
About
Two years in security operations have given me a clear sense of what SOC work actually demands, and a strong conviction that I’m ready to bring that experience to any SOC. My background spans threat detection, incident response, and cross-functional collaboration with CSIRT, and I have built the kind of methodical, documentation-driven work ethic that holds up at 2am when something is quietly wrong.
Over the past two years at MyDFIR, I worked across Microsoft Sentinel, Defender XDR, and Splunk as part of a Level 2 SOC function processing pre-qualified security incidents, escalating to CSIRT when necessary, and supporting further analysis from there. I developed and maintained playbooks and run books to standardise incident handling, and I documented improvement potential after each incident to close lessons learned loops. I also wrote KQL queries to surface malicious activity and anomalous logon behaviour, and I configured system hardening standards to reduce attack surface — not because it was on a checklist, but because I understood why it mattered.
I’m comfortable with PowerShell, Python, and Bash, and I have working knowledge of network infrastructure including firewalls and IDS/IPS systems. I’ve applied NIST and ISO 27001 frameworks in practice, and I know what it means to work in a compliance-driven, confidential environment including what audit-ready documentation requires.
I take seriously the responsibility of being someone a team can rely on: keeping documentation tight, contributing to run book improvements, flagging what’s quietly wrong before it becomes a problem, and being honest about what I’m still learning.
I'd welcome the chance to talk.