Cyber Security Lead and Purple Teaming Specialist with over 6 years of experience in SOC monitoring, threat detection, and incident response across hybrid environments including AWS and Azure. Expert in leading SOC teams, fine-tuning detection rules, and operationalizing SIEM/SOAR platforms such as IBM QRadar, Azure Sentinel, and Microsoft Defender for Cloud. Skilled in cloud-native security monitoring (CloudTrail, GuardDuty, NSG Flow Logs), API telemetry, and advanced use case development. Leads impactful purple teaming engagements using MITRE ATT&CK, Cymulate, and Caldera to validate and enhance detection efficacy. Known for executing successful PoCs, building scalable monitoring pipelines, and aligning security operations with real-world threats
Security Architecture & Engineering Cyber Monitoring & Threat Detection Incident Response Purple Teaming & Continuous Improvement Governance & Strategic Oversight
SIEM & SOAR: IBM QRadar, Resilient
Cloud Security: AWS (GuardDuty, CloudTrail), Azure (Defender, Sentinel), Checkpoint CloudGuard, Hybrid Architecture
Monitoring & Detection: EDR (CrowdStrike, SentinelOne), WAF (Akamai, FortiWeb), API & UEBA Monitoring
Incident Response: Threat Hunting, Triage, RCA, Playbooks, Forensics (KAPE, Volatility)
Purple Teaming: MITRE ATT&CK, Atomic Red Team, Caldera, Detection Gap Analysis using Cymulate
Frameworks & Compliance: NIST, ISO 27001, CIS, SOC 2