Cybersecurity professional with 4 years of hands-on experience in a 24x7 Security Operations Center (SOC), specializing in incident handling, threat detection, and response. Proven expertise in using industry-standard tools such as IBM QRadar, Microsoft Sentinel, CrowdStrike, SentinelOne, and Bitdefender to monitor, investigate, and contain security threats. Skilled in firewall log analysis, rule review, and configuration management across platforms like Checkpoint and Palo Alto, with a strong focus on identifying misconfigurations and unauthorized traffic. Adept at conducting end-to-end investigations, correlating data from multiple sources, and providing clear incident documentation to support compliance and continuous improvement. Known for swift and effective incident escalation, root cause analysis, and cross-team collaboration in high-pressure environments.
Siem (Qradar)
Phishing analysis
Email Investigation
Azure Sentinel
Crowd strike
DarkTrace
Sentinel One
EDR
undefinedCSA (Certified SOC Analyst)