SIEM Monitoring & Alert Triage
Real-time security event monitoring using Microsoft Sentinel and Splunk — correlating logs from Azure, on-prem, and cloud applications with KQL/SPL to prioritize and validate high-severity alerts.
Senior SOC Analyst & Cybersecurity Professional with 10+ years protecting enterprise environments across healthcare, banking, and global IT. I find threats before attackers exploit them.
10+ years defending enterprise environments. Zero tolerance for blind spots.
Certifications
With 10+ years in cybersecurity, I specialize in real-time threat detection, alert triage, and end-to-end incident response across enterprise-scale environments. My career spans global healthcare insurance (Aetna), banking (Standard Chartered), and international IT managed services (Wipro, Accenture).
At Aetna, I monitor thousands of daily events in Microsoft Sentinel and Splunk, using KQL to validate correlated alerts, investigate identity-based risks via Azure AD Identity Protection, and map attack behaviors to the MITRE ATT&CK framework — contributing to 82%+ SLA compliance and an 11% reduction in identity-related incidents within one year.
Outcome-driven security engagements that reduce risk, meet compliance, and prevent breaches.
Real-time security event monitoring using Microsoft Sentinel and Splunk — correlating logs from Azure, on-prem, and cloud applications with KQL/SPL to prioritize and validate high-severity alerts.
Proactive threat hunting through endpoint telemetry and authentication logs — enriching indicators of compromise with VirusTotal and AlienVault OTX, mapped to MITRE ATT&CK techniques for root-cause identification.
End-to-end incident handling per SOC playbooks — account isolation, password enforcement, endpoint quarantine, and tier escalation management. Complete ServiceNow documentation for HIPAA and NIST CSF compliance.
Monitoring Azure workloads via Defender for Cloud — reviewing conditional access policies, detecting risky sign-ins, impossible travel events, and identity-based misconfigurations across hybrid environments.
Enterprise-wide vulnerability discovery via Tenable.io and Nessus across all network segments — prioritized by exploitability and business impact with clear, executive-ready remediation roadmaps.
Deep-packet inspection using Wireshark and TCPDump to confirm suspicious outbound connections and identify malware C2 beaconing via anomalous DNS — correlated with endpoint telemetry for evidence-based response.
Real SOC operations and security engagements — sanitized for confidentiality.
Detected credential compromise via Azure AD Identity Protection — threat actor authenticated from two geographic locations 3 minutes apart targeting PHI systems.
Splunk alert triggered on 14,000+ failed login attempts per minute from rotating residential proxy IPs — automated credential stuffing attack on member portal.
Security review during "Wipro Global Cloud Migration" uncovered exposed storage blobs and overpermissioned service principals creating privilege escalation paths.
Wireshark packet analysis confirmed periodic DNS queries to newly-registered DGA domains — consistent with Cobalt Strike C2 beaconing on a VPN-connected endpoint.
Tenable.io scan across provider portal infrastructure discovered EternalBlue-vulnerable legacy Windows Server hosts processing member and claims data.
Investigated 23 phishing emails with macro-enabled .xlsm attachments reported via security mailbox — correlated with AlienVault OTX to an active BEC campaign.
Industry-recognized certifications validating expertise in cybersecurity, networking, and ethical hacking.
Ready to strengthen your security posture. All engagements include technical reports and executive summaries.
Whether you need SOC advisory, incident response support, vulnerability assessment, or cloud security monitoring — I deliver outcomes that reduce real risk. Based in New York, NY. Available for remote and on-site engagements.
All inquiries answered within 24 hours. Emergency incident response available 24/7.