Cybersecurity professional with 7+ years of experience specializing in Incident Response, SOC Operations, VAPT, and Client Services at the CVDM level.
Skilled in threat hunting, digital forensics, and adversary tactics, with a strong ability to investigate and remediate security breaches from targeted attacks to large-scale intrusions.
Certified in ECHIv2, QRadar Professional, Cylance Security Professional, CYSA+, BTL1, and BTJA, demonstrating expertise in security analysis, threat detection, and response strategies.
Proficient in advanced security tools, including Cybereason Sensor, Cylance Protect and Optics, QRadar, Nessus and tenable.io, Metasploit, Volatility, Cybersixgill, Axiom, EnCase, VeraBlack (in-house data processing tool), Triage, Flare-VM, and Burp Suite.
Passionate about proactive defense, security automation, scripting and continuous learning to stay ahead in the ever-evolving cybersecurity landscape.
Overview
10
10
years of professional experience
Work History
PRINCIPAL SECURITY ANALYST
Cybereason
04.2023 - Current
Triaging and responding to critical security incidents, ensuring rapid containment and mitigation.
Mentoring and training Tier 1 & Tier 2 analysts, enhancing their technical skills and incident-handling capabilities.
Leading threat hunting initiatives across EMEA GSOC, driving proactive threat detection and intelligence-sharing in weekly sessions.
Developing and optimizing new use cases for detecting active exploits and vulnerabilities, strengthening security posture.
Refining EDR/XDR alerting rules, significantly reducing false positives through historical data analysis and fine-tuned detections.
Performing in-depth malware analysis on emerging threats from client environments and threat intelligence feeds.
Conducting sandbox testing using Triage! SOAR on D3! for automated incident response, along with static and dynamic analysis on Flare-VM for deeper malware investigation.
Managing and guiding a team of security analysts, fostering a high-performance cybersecurity operations environment.
INCIDENT RESPONSE CONSULTANT
Blackberry
12.2020 - 04.2023
Actively participated in incident response and threat mitigation, ensuring swift action during security events.
Conducted in-depth technical analysis of security incidents, including malware analysis, network packet inspection, and system-level forensic investigations.
Performed compromise assessments to detect and analyze potential security breaches.
Collected and examined disk and memory images to uncover evidence related to cyber incidents.
Developed and refined incident response plans and procedures, covering detection, containment, eradication, and remediation strategies.
Led client-facing incident engagements, providing expert guidance and actionable insights.
Managed stakeholder communication, ensuring timely updates and strategic recommendations.
SENIOR SOC ANALYST
Evros
07.2019 - 12.2020
Respond to security events react appropriately to protect Internal and Client information and assets
Utilize endpoint products to identify malicious activity on the network
Review daily, weekly, and monthly reports for actionable tasks for the SOC
Ensure appropriate security incident management and threat response processes are followed
Analyze SOC functions and recommend upgrades/changes to ensure the security of the Company
Continuously assess current state of security monitoring and recommend changes for improvement
Proactively conduct research of client network traffic and system activity looking for security anomalies and suspicious activities
Perform Advanced Persistent Threat correlation between multiple security event sources such as firewall logs, threat intelligence feeds, AV, IDS & IPS
Responsible for tuning and implementing configuration changes related to firewalls, IDS/IPS, endpoint security, SIEM, and other security tools, as necessary
Design and deploy Vulnerability Management and remediate risks
Create and maintain process documents related to SOC in line with ISO27001 controls
In depth technical understanding of threats, vulnerabilities, and exploits