Experienced SOC Analyst Level 2 with 3 years of progressive experience in security monitoring, incident investigation, and threat analysis. Adept at triaging and escalating complex security events, mentoring Level 1 analysts, and driving effective incident response. Skilled in using leading security tools, including Microsoft Sentinel and CrowdStrike, with proven expertise in analyzing security alerts, responding rapidly to incidents, supporting threat-hunting activities, and contributing to the continuous improvement of SOC processes. Recognized for strong collaboration, communication, and critical thinking in fast-paced environments.