About
Cybersecurity Analyst with over 2 years of hands-on experience specializing in security operations, threat detection, and incident response within enterprise Security Operations Center (SOC). Proven expertise in monitoring and managing Microsoft Defender XDR and Microsoft Sentinel across hybrid and multi-cloud environments to deliver real-time threat triage and rapid incident remediation. Skilled in conducting proactive threat hunts using Kusto Query Language (KQL), automating incident response workflows with Azure Logic Apps, and analyzing diverse log sources for comprehensive threat visibility and forensic investigations. Strong foundation in MITRE ATT&CK framework, adversary TTP analysis, and endpoint/network forensics combined with experience in phishing investigations, and security alert triage to accelerate detection and containment.
Skills & Expertise (29)
Work Experience
Security Analyst
Accenture
Nov 2023 - Present
Monitored and responded to real-time security alerts using Microsoft Sentinel and Microsoft Defender, enabling rapid threat detection, triage, and containment in hybrid environments. Led end-to-end incident response investigations for malware, phishing, and social engineering incidents through detailed log analysis, forensics, and EDR telemetry, ensuring timely remediation and meticulously documented outcomes. Designed and executed advanced threat hunting queries using Kusto Query Language (KQL) in Microsoft Sentinel, uncovering suspicious activity and reducing threat dwell time by actively identifying hidden adversary behaviors. Correlated events and logs from SIEM alerts, firewall logs, endpoint telemetry, and network events to detect and triage security incidents. Investigated Identity based threats leveraging Azure AD and Identity Protection. Architected and automated incident response workflows using Azure Logic Apps and Sentinel playbooks, decreasing manual efforts by and improving MTTR for security incidents. Fully automated DDoS triage using automation, reducing manual effort by 100%. Authored and optimized analytics rules and detection logic mapped to MITRE ATT&CK, boosting detection of adversary tactics and enhancing security visibility across the stack. Designed and delivered weekly and monthly security status reports and operational summaries for leadership and clients. Maintained accurate incident documentation, runbooks, and post-incident reports to support governance, compliance audits, and continuous improvement. Collaborated closely with IT, infrastructure, and security teams to drive improvements in threat detection, response workflows, and operational stability. Stayed up-to-date with emerging threats and threat intelligence to proactively adapt detection strategies and reinforce defense posture.
Education
Bachelor of Technology, ECE - Techno India University
2019 - 2023 · Afghanistan
Certifications
No certifications added yet
Interested in this developer?
Profile Score Breakdown
Profile Overview
Skills (29)
Click a skill to find developers with the same skill