Security Operations Analyst specializing in defensive cybersecurity:
- Threat Detection: Developed 150+ Sigma rules covering MITRE ATT&CK framework
- Incident Response: Managed security incidents from detection to containment
- Malware Analysis: Conducted static/dynamic analysis of Windows/Linux malware
- SOC Optimization: Implemented alert tuning to reduce false positives
- Threat Intelligence: Built automated feeds with MISP and OTX integration
"Transforming security data into actionable intelligence through precision detection engineering and threat-informed defense strategies."
- Tools: Splunk, Sigma, Sysmon
- Highlights:
- Created detection rules for 85% of MITRE ATT&CK techniques
- Implemented automated IOC enrichment workflows
- Developed documentation for SOC analysts
- Tools: REMnux, YARA, CAPE
- Highlights:
- Built automated analysis pipeline
- Developed detection signatures for common malware families
- Documented analysis methodologies
- Tools: Splunk, Python
- Highlights:
- Created alert triage playbooks
- Developed reporting dashboards
- Automated routine investigation tasks
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
Security Monitoring: Splunk ES | Microsoft Sentinel | ELK Stack
Endpoint Security: CrowdStrike | Microsoft Defender ATP | Tanium
Forensics Tools: Velociraptor | FTK | Autopsy
Malware Analysis: IDA Pro | Ghidra | Cuckoo Sandbox
Scripting: Python | PowerShell | Bash
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬