Primary TDR analyst responsible for leading incident response, standardizing procedures, and enhancing detection capabilities through proactive measures and threat intelligence integration. Focused on minimizing cyber risk and improving the organization's security posture.
Quantifiable Achievements & Impact
- Led triage and response for 50+ declared cybersecurity incidents as the primary TDR analyst; authored cyber incident after action reports (CIAAR) and managed high-severity bridge calls with cross-functional digital technology teams.
- Served as secondary team lead, driving SOP standardization, TDR process alignment, and contributing to Incident Response Framework development initiatives.
- Submitted 60+ enhancement requests including alert tuning, log source integrations, and automation improvements; developed 15 custom detection rules using threat intelligence and log hunting techniques.
- Classified and responded to 500+ phishing reports, created Azure Sentinel phishing workbooks, and implemented automated Teams SLA notifications and user response workflows.
- Contributed to development of IOIs, SOPs, and IR playbooks; built Sentinel workbooks to enable 360-degree incident reviews and improve visibility for the SOC team.
- Participated in adversary-driven threat hunting based on MITRE TTPs provided by the Threat Intel team, and supported enterprise wide cyber hygiene initiatives.
- Represented the TDR team in 4 tabletop exercises (TTXs) and contributed to planning and execution as part of the TTX hosting team.
Core Responsibilities: Incident Triage & Response, SOP Standardization, Alert Tuning, Log Source Integration, Automation, Phishing Analysis, Playbook Development, Threat Hunting, Tabletop Exercises.
Technologies & Frameworks: Azure Sentinel (SIEM), KQL, EDR Solutions, Threat Intelligence Platforms, MITRE ATT&CK, Incident Response Frameworks, Microsoft Teams Automation, SOAR (conceptual).
















