Years Of Experience
Projects Completed
SIEM Alerts Monitored Daily
My Skill Set
Monitoring SIEM alerts, investigating incidents, and executing response workflows to detect threats and ensure enterprise security compliance.
Analyzing attack patterns, adversary TTPs, and logs to identify threats and improve detection capabilities across security environments.
Securing endpoints and cloud systems using tools like SentinelOne, Defender, and IAM frameworks ensuring strong access control and monitoring.
Why Choose Me
• Monitored 5,000+ SIEM alerts daily identifying 250+ critical threats across network, endpoint, and cloud security environments.
• Triaged 400+ security events monthly reducing false positives by 30% and improving escalation accuracy for Tier-1 SOC operations.
• Documented 350+ investigation findings ensuring audit compliance, knowledge transfer, and standardized incident reporting across SOC workflows.
• Resolved 200+ Tier-1 incidents monthly using SOC playbooks ensuring service uptime and efficient incident lifecycle management.
• Communicated 150+ incidents weekly providing investigation summaries and mitigation recommendations ensuring timely client response.
• Maintained SOC documentation across 25+ processes improving knowledge base accuracy and response time for recurring incidents.
• Applied MITRE ATT&CK mapping analyzing 100+ adversary TTPs supporting 50+ threat hunting operations improving detection coverage.
• Collaborated with 5 SOC teams and 3 departments reducing dwell time by 40% during containment and remediation workflows.
• Monitored 3,500+ alerts weekly across SIEM and security tools identifying threats and escalating confirmed incidents with detailed analysis.
• Conducted triage for 300+ incidents monthly reducing backlog by 25% and improving SOC operational efficiency.
• Escalated 150+ events monthly providing documentation and mitigation recommendations improving Tier-2 incident handling accuracy.
• Analyzed 400+ logs weekly detecting anomalies and early-stage breaches improving threat detection coverage.
• Managed 24/7 SOC shift handovers ensuring continuous monitoring and reducing exposure duration by 30% for critical threats.
• Updated SOC playbooks reducing investigation cycle time by 20% through optimized workflows and documentation practices.
• Performed log correlation and alert tuning reducing false positives by 35% improving detection accuracy across systems.
• Enhanced threat detection by integrating correlation rules improving SOC defense readiness by 25% through proactive analysis.
DEGREE
Security Operations Lead
Cybersecurity Lead