ProfilSenior Security Engineer with 14+ years of progressive experience in enterprise security architecture, cloud security, and SOC operations. Currently available for freelance/ contract/ fulltime security engineering engagements. Proven expertise deploying EDR solutions to 30,000+ endpoints, building SOC operations from scratch, and implementing zero-trust security frameworks. Strong background in Microsoft 365 security solutions (Intune, Defender, Purview), AWS cloud security, SIEM platforms (Splunk, Wazuh) and DevSecOps automation. Track record of successful ISO 27001, PCI-DSS and NIST compliance implementations across Fortune 500 companies.
Key Achievements and Impact- Enterprise Security Transformation: Led EDR deployment to 30,000+ endpoints across 15 countries in under 12 months, 3 months ahead of schedule
- SOC Operations: Built SOC from ground up with documented playbooks, reducing MTTR by 45% and achieving 99.5% P1 incident SLA
- Vulnerability Reduction: Decreased critical vulnerability exposure by 70% through systematic patch management and 60% through OS hardening initiatives
- Automation Impact: Reduced manual security tasks by 60% and improved network uptime by 15% through custom automation tools
- Compliance Excellence: Achieved ISO 27001, PCI-DSS Level 1, and NIST compliance with zero major audit findings
- Incident Response: Maintained 99.9% uptime SLA while managing critical P1 security incidents across global infrastructure
Skills- Security Operations
- SOC Architecture
- Threat Hunting
- Incident Response
- CSIRT Collaboration
- Security Playbooks
- Threat Intelligence
- Alert Triage
- Root Cause Analysis
- Endpoint Security
- SentinelOne
- Microsoft Defender for Endpoint
- Microsoft Intune
- Microsoft Entra ID
- Azure Active Directory
- Endpoint Hardening
- Patch Management (KACE)
- CIS Benchmarks
- Cloud Security
- AWS Security (IAM, Security Hub, GuardDuty)
- Microsoft 365 Security (Intune, Defender for Office 365, Purview DLP)
- Azure Security
- Zero Trust Architecture
- Container Security
- Cloud Compliance
- SIEM & Monitoring
- Splunk (Dashboard Creation, Correlation Rules)
- Wazuh (FIM, Vulnerability Management)
- NetForensics SIEM
- Zabbix
- SNMP
- Syslog-ng
- Log Analytics
- Network Security
- Cisco ASA Firewall
- Checkpoint Firewall (R80, CCSA)
- Fortinet
- F5 Load Balancer
- A10 Load Balancer
- Cisco ISE
- Infoblox (DNS/DHCP)
- VPN Solutions
- IDS/IPS (McAfee, Cisco)
- Data Loss Prevention
- Microsoft Purview
- Email Security
- Content Filtering
- DLP Policy Implementation
- DevSecOps & Automation
- Python
- PowerShell
- Bash
- R
- REST
- APIs
- JSON
- CI/CD Security Integration
- Infrastructure as Code
- Security Automation
- Penetration Testing
- Kali Linux
- BurpSuite
- OWASP ZAP
- MobSF
- Active Directory Penetration Testing
- Web Application Security Testing
- Vulnerability Management
- Nessus
- Qualys
- OWASP ZAP
- Vulnerability Assessment
- Risk Prioritization
- Remediation Tracking
- Compliance & Frameworks
- ISO 27001
- PCI-DSS
- NIST Cybersecurity Framework
- DORA
- SOC 2
- GDPR
- Security Auditing