Summary of Career
1. SIEM & Detection: Splunk, Elastic Stack, OpenSearch — correlation rule tuning, dashboard creation
2. Incident Response (L1): Alert triage, initial investigation, IOC enrichment, escalation
3. Threat Analysis: Phishing, brute-force, log correlation, MITRE ATT&CK Framework
4. Cloud Security: AWS GuardDuty, CloudTrail, SecurityHub, CloudWatch
5. Network / Endpoint: Firewall & VPC logs, tcp/ip analysis, Defender for Endpoint
6. Ticketing / Workflow: Jira,Opsgenie, SOC shift reporting
7. Collaborated with IT & Cloud teams to remediate vulnerabilities, contributing to a 25% reduction in open critical security findings.
8. Enriched IOCs using threat intelligence sources (VirusTotal, public feeds), mapping to MITRE ATT&CK technique(s).
9. Produced daily shift reports and incident summaries, ensuring clear communication to SOC leads and stakeholders.
10. Monitored 30+ security alerts daily via Splunk and Elastic Stack, triaging and escalating high-priority incidents.
Experience as SOC Analyst
C3Spectra Inc
10 August 2022
To date
● Monitored 30+ security alerts daily via Splunk and Elastic Stack, triaging and
escalating high-priority incidents.
● Tuned correlation rules to reduce false positives by ~35%, improving
alert-to-incident accuracy.
● Collaborated with IT & Cloud teams to remediate vulnerabilities, contributing
to a 25% reduction in open critical security findings.
● Designed and implemented 8+ dashboards in Splunk and OpenSearch to
highlight key threat metrics and trends.
● Enriched IOCs using threat intelligence sources (VirusTotal, public feeds),
mapping to MITRE ATT&CK technique(s).
● Produced daily shift reports and incident summaries, ensuring clear
communication to SOC leads and stakeholders.
Bachelor 17 May 2013
Major - Computer Science Engineering GPA - 3.5/5Cisco Certified Network Associate - CCNA Security
Certified Ethical Hacker - CEH
AWS Solution Architect Assosicate
AWS Security Specialist