Cyber Security


Highly skilled and results-driven IT & Cybersecurity professional with 11.5 years of experience in delivering secure, reliable, and high-performing technology solutions across enterprise environments. Expertise spans SOC operations, security monitoring, incident response, threat analysis, vulnerability management, cloud security, and IT infrastructure support. Strong hands-on exposure to SIEM, EDR, IDS/IPS, SOAR and IT systems, with a track record of working collaboratively across cross-functional teams to resolve incidents, optimize performance, and implement best practices. Committed to continuous learning, technology enhancement, and delivering measurable improvements to overall security and IT operations.
• Identify suspicious activities such as brute-force attacks, malware infections, unauthorized access, privilege escalation, and anomalous network behavior.
• Ensure continuous log ingestion and health monitoring of SIEM components.
• Work with SOC tools such as SIEM, EDR, IDS/IPS, Firewalls, DLP, and SOAR.
• Ensure alert handling and incident response activities comply with organizational policies and regulatory requirements.
• Monitor cloud environments (AWS, Azure, GCP) using SIEM, CSPM, CWPP, and native cloud security tools.
• Investigate misconfigurations, compromised credentials, exposed resources, and network anomalies.
• Support L2/L3 teams during cloud-related incidents such as ransomware, account compromise, or lateral movement.
• Identify open ports, misconfigured ACLs, and suspicious inbound/outbound connections.
• Track patching and remediation activities in coordination with DevOps/Infra teams.
• Review and validate vulnerability scan results for servers, endpoints, and applications.
• Conduct initial triage of security incidents and escalate to senior analysts when necessary.
• Perform real-time analysis of security events to identify malicious activity or policy violations.
• Analyze logs from servers, applications, network devices, and cloud resources.
• Provide Level 1/Level 2 support for desktops, laptops, printers, and peripherals.
• Respond to support tickets, calls, and walk-in requests in a timely manner.
• Install, configure, and update operating systems, applications, and security patches.
• Deploy new desktops/laptops, configure user profiles, and migrate data.
ArcSight SIEM Administrator
DNIF SIEM
Rapid 7 Insight IDR & VM
Zscalar Smokescreen
ArcSight SOAR
Thor Heimdal EDR
Trend Micro EDR
Seceon SIEM
Splunk SIEM
Carbon Black EDR
Qradar
Cyber Crime Investigation
Cyber Security
Threat Hunting
Digital Forensics
Certified Ethical Hacker
ArcSight Administrator
Cyber Crime Investigation