Cybersecurity professional with expertise in threat detection, incident response, and network security. Proficient in leveraging tools such as Wireshark, Metasploit, and Splunk for vulnerability assessment and log analysis. Skilled in identity and access management, cloud security, and compliance with standards like ISO 27001 and NIST. Adept at delivering presentations, participating in conferences, and fostering cybersecurity awareness through effective communication. Committed to implementing robust security measures to mitigate risks and safeguard enterprise systems.
Adaptable and flexible team player with strong time management and organisational skills. Quick learner confident in meeting tight deadlines in fast-paced environments. Takes own initiative to complete tasks and identify process improvements.
Developed a strong understanding of cybersecurity operations, including vulnerability and patch management using Tenable and Ivanti to identify and mitigate security risks. Gained insights into identity and access management (IAM) with SailPoint IAM, focusing on role-based access control (RBAC), provisioning, de-provisioning, and user access reviews.
Explored Security Information and Event Management (SIEM), specifically Microsoft Sentinel, to analyze logs, detect threats, and support incident response. Acquired knowledge in threat intelligence and phishing detection, leveraging Proofpoint Security and VirusTotal for analyzing Indicators of Compromise (IoCs).
Additionally, studied SOC automation, using playbooks for automated incident response, and brand protection strategies to monitor phishing attempts, impersonation, and malicious domains. Developed an awareness of enterprise security governance and compliance policies to support organizational cybersecurity frameworks.
Beyond technical skills, this experience significantly strengthened my communication and teamwork abilities. Engaging with cybersecurity professionals in a fast-paced environment enhanced my ability to collaborate effectively, present findings, and articulate complex security concepts clearly. Working in a structured, high-security setting provided valuable exposure to professionalism, corporate culture, and real-world cybersecurity challenges.