Who I Am
MDR Analyst with nearly 5 years of experience in threat investigation, threat hunting, and detection validation across endpoint, identity, and email security environments. Day to day, I analyze suspicious process execution, persistence mechanisms, and other common attacker behaviors — determining whether activity is malicious, benign, or requires additional monitoring.
A major part of my work involves turning technical findings into clear, actionable documentation. I regularly create investigation summaries, escalation notes, false positive closures, and remediation guidance that bridge the gap between security operations and client communication.
I’m especially interested in Windows-based investigations, malware behavior, persistence techniques, DFIR, and practical analyst tradecraft. I also value building repeatable investigation workflows, documenting useful commands, and improving how analysts communicate technical findings.
Experience
- MDR Analyst — Investigating threats and validating detections across multi-tenant client environments, producing investigation summaries, escalation notes, and remediation guidance
- Cybersecurity Team Lead — Managed a team of analysts, establishing investigation workflows, escalation procedures, and documentation standards
- Cybersecurity Analyst (Tier 1 & 2) ��� Triage, investigation, and response across endpoint, identity, and email security alerts
- Incident Response — Led response efforts for ransomware events, persistent threat actor access, and advanced LOLBin/BYOVD abuse across enterprise environments
- International Training — Traveled to Mexico to deliver on-site security training for a newly formed team, all of whom have since advanced to senior roles in the industry
Platforms & Tools
| Category | Tools |
|---|---|
| EDR | CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint |
| SIEM | Splunk, Microsoft Sentinel, FortiSIEM, LogRhythm, AlienVault |
| Hunting & Analysis | ELK, Volatility, Wireshark, Velociraptor |
| Cloud Security | Microsoft Azure (AZ-500), Entra ID |
Certifications
| Certification | Issuer |
|---|---|
| SentinelOne SIREN | SentinelOne |
| AZ-500: Azure Security Engineer Associate | Microsoft |
| SC-200: Security Operations Analyst Associate | Microsoft |
| eCTHPv2: Certified Threat Hunting Professional | INE Security |
| Security+ | CompTIA |
What’s on This Site
- Research — Detection rules, IR playbooks, and threat analysis mapped to MITRE ATT&CK
- Notes — Threat hunting labs, DFIR walkthroughs, and email forensics guides
- Write-ups — CTF and HackTheBox write-ups
- RTRange — Interactive red team vs. blue team training scenarios
Contact
- GitHub: secbysrg