About
Cyber Security Analyst with 2+ years of experience in SOC operations, specializing in threat detection and incident response using Microsoft Sentinel and Microsoft Defender supported by Microsoft SC-200 certification. Skilled in KQL-based log analysis, alert triage, and security investigations. Experienced in SIEM rule tuning, dashboard creation and remediation tracking with a working knowledge of MITRE ATT&CK and cloud security concepts.
Skills & Expertise (23)
Work Experience
IT Support Technician
Charter East Dulwich School
Sep 2022 - Sep 2022
Triaged and resolved technical support issues related to hardware, software, and network connectivity for over 200 users, resolving 95% of incidents within SLA targets. Assisted in system updates, patch management, and security configurations for Windows and Linux environments. Monitored network devices to ensure compliance with basic security policies and supported the incident escalation process.
Cyber Security Analyst
Sperry Marine
May 2023 - Dec 2025
Monitored systems using Splunk, Sentinel and Microsoft Defender to detect security threats. Investigated incidents using logs, threat intelligence and packet analysis tools like Wireshark. Performed phishing simulations and security awareness training for end users. Conducted threat hunting and IOC analysis to identify emerging risks. Created security reports and dashboards for incident tracking. Developed basic KQL queries and SOC playbooks for detection improvement. Worked with IT teams to implement security controls and compliance measures.
SOC Analyst
Node4
Mar 2025 - Present
Monitored and triaged alerts using Microsoft Sentinel and Microsoft Defender, ensuring timely threat detection and escalation. Performed log analysis using KQL, supporting incident investigations and reducing false positives, thereby improving alert accuracy. Performed threat hunting activities mapped to MITRE ATT&CK techniques, improving detection of advanced threats. Ensured timely alert triage and incident escalation in line with defined SLAs, maintaining SOC response standards. Assisted in incident response following SOC playbooks and escalation procedures. Developed and optimized SIEM detection rules and use cases based on threat intelligence. Created SIEM dashboards and monthly reports, providing actionable insights on incident trends and security posture. Tracked security findings and remediation progress, escalating high-risk or overdue issues. Collaborated with risk, audit, and IT teams to address security gaps. Contributed to process improvements and basic automation within SOC operations. Used HIVE for case management and incident tracking. Supported onboarding and trained junior analysts.
Education
Masters in CyberSecurity - University of Hertfordshire
2019 - 2021 · Afghanistan
Bachelor of Science: Computer Science of Engineering - Vaagdevi College of Engineering
2015 - 2019 · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Availability Details
Visa Status
Citizen
Relocation
Open to Relocation
Skills (23)
Click a skill to find developers with the same skill