Security Analyst
Cybriant Aug 2024 – Present- Contribute to governance initiatives through policy (e.g. Change Management Policy, Endpoint Security Configuration and Protection Modification Policy) & procedure recommendation and development (e.g., SOAR Change Management Procedure, Client Risk Acceptance Waiver Template, Disabling Agents in SentinelOne, Changing User Permissions in SentinelOne, and Exclusion Management in SentinelOne)
- Lead incident investigations using SIEM, EDR, and SOAR platforms (SentinelOne, Google SecOps, Azure Sentinel).
- Engaging security awareness training development (Mock Phishing Campaigns, Jeopardy Style Security Trivia, Review of common IOCs from recent attack trends from previous quarter), and alignment with regulatory and client requirements (CMMC & SOC2
- Lead incident investigations using enterprise SIEM, EDR, and SOAR platforms (SentinelOne, Google SecOps/SOAR, Azure Sentinel, AlienVault, NetEnrich, Seceon).
- Support incident response operations, including containment, remediation coordination, and development of playbooks and post-incident documentation (also took charge of what we call “enhanced monitoring” where we pay special attention to client environment directly, not utilizing SOAR platforms, providing daily updates and immediate response on any suspicious indications/flagged activity, followed by verification by phone or Teams with the client).
- Manage security tickets and client inquiries (Zoho Suite and ConnectWise ticketing systems), deliver technical analysis, actionable recommendations, and clear stakeholder communication (through phone, Microsoft Teams, and messaging/tickets).