Experienced with monitoring and analyzing security events to protect organizational assets. Utilizes strong analytical skills to identify threats and vulnerabilities. Knowledge of cybersecurity protocols and effective incident response techniques, ensuring robust defense against potential breaches.
Threat advisory creation
Security documentation
Microsoft Defender 365
Manual Hunting
Security Operations
Linux
Incident Response
Incident Handling
undefined