Senior Administrator / Soc Analyst
Send a job offer directly to this candidate
Dynamic and results-driven Information Security Specialist (SOC Analyst) with 6.5+ years of experience in threat analysis, security monitoring, and incident response. Skilled in administering and integrating SIEM solutions, particularly Splunk and Microsoft Sentinel, including onboarding new log sources, configuring data connectors, building dashboards, and optimizing correlation rules. Experienced in EDR management, malware analysis, alert fine-tuning, and developing use cases aligned with MITRE ATT&CK.
Proven ability to strengthen organizational security posture through proactive threat detection, seamless SIEM integrations, effective incident handling, and continuous improvement of detection capabilities. Committed to staying current with emerging security technologies and industry best practices.
Dynamic and results-driven Information Security Specialist (SOC Analyst) with 6.5+ years of experience in threat analysis, security monitoring, and incident response. Skilled in administering and integrating SIEM solutions, particularly Splunk and Microsoft Sentinel, including onboarding new log sources, configuring data connectors, building dashboards, and optimizing correlation rules. Experienced in EDR management, malware analysis, alert fine-tuning, and developing use cases aligned with MITRE ATT&CK.
Proven ability to strengthen organizational security posture through proactive threat detection, seamless SIEM integrations, effective incident handling, and continuous improvement of detection capabilities. Committed to staying current with emerging security technologies and industry best practices.