🛡️

SIEM Security Operations

Monitored and triaged 20–50 SIEM alerts weekly at Workato, resolving Tier 1 incidents and documenting response actions to support the security team's incident management process. Implemented systematic alert prioritization and response protocols.

IMPACT

Reduced escalation workload for senior security team members through effective initial triage and comprehensive documentation

SIEM Threat Detection Incident Response Security Operations
📊

Security Analytics Dashboard

Designed and deployed 5+ Sigma dashboards leveraging Product Security Portal data, enabling real-time tracking of security bugs and issue trends. Created interactive visualizations for improved decision-making and security posture monitoring.

IMPACT

Cut report preparation time by 30%, streamlining security team workflows and enhancing visibility into security metrics

Sigma Data Visualization Security Metrics Dashboard Design
🔍

Network Traffic Analysis

Conducted comprehensive packet analysis using Wireshark to capture and evaluate network traffic patterns, identifying potential security anomalies and protocol vulnerabilities. Analyzed TCP/IP communications and detected unusual traffic behaviors.

SKILLS APPLIED

Network protocols, packet inspection, traffic pattern analysis, security anomaly detection, and forensic investigation techniques

Wireshark Network Security Traffic Analysis Protocol Analysis
☁️

Cloud Security & IAM

Deployed AWS IAM policies, configured static websites with security best practices, and implemented load balancers to ensure secure and scalable cloud infrastructure. Established least-privilege access controls and multi-factor authentication.

SKILLS APPLIED

AWS IAM, cloud security architecture, access control policies, infrastructure security, and secure deployment practices

AWS IAM Cloud Security Infrastructure
📋

Risk Assessment & Active Directory

Applied cybersecurity frameworks through academic projects including risk assessments with FAIR-U and Active Directory configuration in virtualized environments. Implemented Group Policy Objects and security hardening measures.

SKILLS APPLIED

FAIR-U framework, risk quantification, Active Directory, security policy implementation, and enterprise identity management

FAIR-U Active Directory Risk Assessment Policy Management