Cybersecurity Analyst
- Monitored and analyzed security events using SIEM (Security Information and Event Management) tools to identify potential security incidents and threats.
- Prepared detailed investigation reports for true positive events, outlining the incident timeline, impact analysis, and remediation steps.
- Creating and updating Suricate rules for effective threat detection and response.
- Monitor and analyze security events and alerts from various security logs (Azure, IDS, Proxy, SAP, SFTP, etc.).
- Collaborated with SOC analysts, threat hunters, and IT teams to identify automation opportunities, and enhance operational efficiency.
- Investigate and respond to security incidents, including malware infections, phishing attempts, and unauthorised access.
- Assisting in the ISO 27001 Audit: Provided assistance during ISO 27001 audits, ensuring compliance with information security standards.
- Conducted malware analysis of security incidents, and developed incident response plans to minimize damage; implemented correlation searches that identified and investigated over 50 potential security incidents and threats per month.
- Analyzed and assessed the severity and impact of identified vulnerabilities using CVSS and other risk assessment methodologies.
- Phishing Email Analysis: Analyzed phishing emails and implemented security measures to enhance email security.
- Acquired a deep understanding of phishing email anatomy, proficiently identifying red flags such as suspicious URLs, deceptive logos, and compromised sender identities.
- Stay updated with the latest threats, industry trends, and best practices related to CVE monitoring and vulnerability management.