Details
Skills
• SIEM and Security Tools: Microsoft Sentinel, Microsoft Defender, Splunk, Elastic (ELK stack), Snort, Suricata
• Operating Systems & Virtualization: Windows, Linux, macOS, Kali, CentOS, ParrotOS, VMware, VirtualBox, GNS3
• Cloud & Network Security: Microsoft Azure, Entra ID, AD, AWS, TCP/IP, OSI model, Cisco, Routing/Switching, Wireshark
• Offensive Security: Metasploit, Burp Suite, Nmap, Nessus, Nexpose, OpenVAS, Hydra, Sqlmap, Volatility
• Security Frameworks: MITRE ATT&CK, Cyber Kill Chain, Diamond Model, NIST CSF, ISO 27001, OWASP, HIPAA
• Languages: C, Python, PowerShell, SQL, HTML
About
I have a strong background in monitoring and mitigating cyber threats. My recent experience as a SOC Analyst involved managing security for over 30 MSS clients, where I utilized a SIEM platform like Microsoft Sentinel to analyze and respond to security events. I became adept at employing the MITRE ATT&CK Framework to understand and address threats, and I triaged more than 200 security incidents weekly using various analytical tools. My investigations included analyzing indicators of compromise from different log sources and responding effectively to intrusion attempts, which contributed to maintaining a 99% compliance with incident resolution deadlines.
Prior to my role in cybersecurity, I worked as a Front End Associate, honing my interpersonal and communication skills in a high-pressure retail environment. I was instrumental in improving customer satisfaction and reducing complaints through effective problem-solving and teamwork. My experiences have equipped me with a unique blend of technical expertise and customer service skills, enabling me to collaborate effectively across teams while maintaining a focus on security and efficiency.