SIEM (QRadar, ArcSight, Sentinel, LR, Splunk)
Experienced Cybersecurity Specialist with over a decade of demonstrated leadership in optimizing security operations. Committed to enhancing cybersecurity through strategic planning, incident response, team leadership, and continuous improvement. Proficient in developing multi-faceted security strategies to safeguard digital assets and mitigate evolving threats. At Mollie B V, spearheaded the creation of a Security Operations Center, significantly enhancing threat detection and incident response capabilities. Expertise in SIEM management and leadership in fostering a culture of continuous improvement led to streamlined security processes and a robust defense posture.
• Leading a 24/7 multicultural global team of T1-T3 Incident Responders and Managing MSSP vendor- relationship
• Manage the day-to-day cyber security incidents, through detailed analysis, interviews and threat research, be able to discern a legitimate threat from a false positive
• Drive strategy of IR for highest criticality Cyber security events serving as POC throughout the Incident lifecycle.
• Conduct rapid response, mitigation and investigations on the highest priority cases impacting Juniper/User Data and develop concise yet detailed report for respective stake holders.
• Analyze data from host, network and file-based data to develop detections associated with Cyber TTP’s
• Support and mentor the team of Incident responders conducting investigations.
• Identify the deficiencies in the Security Posture, and the creation of action plans for remediation of identified deficiencies and drive process improvements
• Supporting team to gather threat intel by working with Federal and State or Local law enforcing agencies, developing research and maintaining proficiency in tools, techniques, counter-measures and trends.
• Develop and cultivate opportunities for career growth and development.
• ·Responsible for evaluation and selection of tools to achieve operational objectives.
• Manage daily SOC Operations - Working as SME in Identification of Security threats, triaging, incident response and expanding the detections mechanisms via Use Cases leveraging MITRE framework.
• Focused and committed during high-impact security incidents.
• Perform remote triage to include volatile memory acquisition and target file system artifact extractions.
• Develop actionable leads during initial response and deploy generated IOC’s in automated mode to identify additional systems of interest.
• Analyze multiple sources of evidentiary data – endpoint artifacts, network packet captures, webserver traffic logs, sandbox reports to validate and prioritize remediation efforts.
• Co-ordinate and provide expert technical support to teammates and other enterprise-wide teams to assist with eradication, recovery, and any post incident activities
• Act as a Lead for IR and Threat Hunting teams being able to Detect, Respond and Remediate identified Security Incidents within SLA.
• Lead a team of highly skilled IR’s and additionally lead Tier-1 function analysts focusing on monitoring, triage and initial response of Cyber threats that operate in 24/7 mode.
• Own CSRIT’s playbooks, runbooks, workflows, documentation, and process including seeking improvement in creating new documentation and their maintenance.
• Identify and recommend operational improvements to the client, drawing SOC operational experience and industry specific knowledge of risks.
• Deliver SOC Monthly and Quarterly Executive reporting.
• Maintain operational oversight of all ticketing activity in the engagement including, but not limited to Security Incidents, Content Development, Tuning Recommendations, Hunting activities, Internal/External audits, SIEM infrastructure management and process improvisation to achieve operational objectives.
• Oversee and manage on time and effective security content development, testing and delivery.
• Lead disaster recovery procedures for Security operations.
• Responsible for maintaining staffing, train and develop the SOC team by demonstrating the experience I carry and leadership skills.
SIEM (QRadar, ArcSight, Sentinel, LR, Splunk)
EDR ( Crowdstrike, Carbon Black, Defender, SentinelOne, Cybereason)
Vulnerability Mgmt(Qualys, CS Spotlight, Nessus, Whitehat, Sysdig)
Memory Forensics(Volatility, Autopsy, Redline)
ITSM ( SNOW, Jira, BMC)
SOAR ( Swimlane, AISaaC MDR)
CISM
• Pioneered the inception and establishment of a complete security operations canter from the ground up.
• Managed the full spectrum of onboarding and implementation of diverse security services within the MSSP framework.
• Strategically executed the deployment of EDR, achieving an impressive coverage rate exceeding 95% and ensuring strict compliance.
• Initiated and skillfully managed an effective in-house Bug Bounty Program, yielding proactive security results both internally and through external collab- oration.
• Designed meticulously tailored operational processes catering to a diverse range of SOC services (MDR, EDR, VM, CTI, DFIR, TH, SIEM).
• Played a pivotal and substantial role in the attainment of PCI-DSS Certification by overseeing integration efforts and meticulously managing use case implementation.
• Led the formulation, creation, and seamless implementation of comprehensive incident playbook/runbook tasks, ensuring the highest standards of security operations delivery.
• Successfully established and led the operation of a pioneering MSS SOC for a prominent telecommunications giant headquartered in Qatar.