SYSTEM: OPERATIONAL

Senior
Cybersecurity
Analyst

Security incident analysis, response and investigation in critical environments.

Dossier ID

SODJI_R_4482

Experience10+ years
Focus AreasSOC / CSIRT

Mission Experience

10+ years

Strategic Threat Intelligence

Incident Mastery

100+ Resolved

Critical Security Events

Defense Strategy

Data-Driven

Zero-Trust Methodology

ACHIEVEMENTS

SOC build-out
APT & ransomware response
MITRE ATT&CK detection
OSINT investigations
SOAR automation
SOC/CSIRT training
SOC build-out
APT & ransomware response
MITRE ATT&CK detection
OSINT investigations
SOAR automation
SOC/CSIRT training
SOC build-out
APT & ransomware response
MITRE ATT&CK detection
OSINT investigations
SOAR automation
SOC/CSIRT training

Technical Expertise

Comprehensive security stack management and defensive operations.

SYS_CMD: list --expertise

SOC & Threat Monitoring

Continuous monitoring, anomaly detection and alert triage in 24/7 environments.

Incident Response (CSIRT)

Qualification, containment and remediation of critical security incidents.

OSINT & Investigation

Open-source intelligence, identity correlation and threat mapping.

Cybercrime & Attribution

Malicious campaign analysis, attribution techniques and threat actor tracking.

Threat Intelligence

Technical and strategic cyber threat intelligence production.

SIEM / EDR / SOAR

Deployment and operation of detection, correlation and automation tools.

Projects

Selected professional and personal cybersecurity projects.

Pro SOC

SOC Automation Framework

Alert triage and enrichment automation via custom SOAR playbooks.

SPLUNKCORTEX XSOARPYTHONMITRE ATT&CK
Personal OSINT

Threat Actor Tracking Platform

IOC tracking and correlation tool for APT groups.

PYTHONNEO4JMISPVIRUSTOTAL API
Pro IR

Incident Response Toolkit

Forensic collection and analysis toolkit for on-site CSIRT operations.

VOLATILITYKAPEVELOCIRAPTORYARA
Personal Cybercrime

Phishing Campaign Analyzer

Automated phishing campaign analysis: infrastructure, kits, exfiltration.

PYTHONURLSCAN.IOSHODANCERTSTREAM
Pro SOC

Detection Engineering Pipeline

CI/CD pipeline for Sigma detection rules with unit tests and automated deployment.

SIGMAELASTICSEARCHGITHUB ACTIONSPYTHON
Personal OSINT

Dark Web Monitor

Automated monitoring of forums and marketplaces for data leak detection.

TORPYTHONPOSTGRESQLGRAFANA

Blog & Case Studies

Technical articles and real-world incident response case studies.

Articles

Nov 18, 2024

Detecting Lateral Movement via Kerberos

SOCTHREAT INTEL
Sep 5, 2024

Automating SIEM Triage with SOAR

SOCSOAR
May 10, 2024

Memory Forensics: Essential Artifacts

IRFORENSICS
Mar 1, 2024

From IOC to Actionable Intelligence

THREAT INTELCTI

Certifications

Industry-recognized cybersecurity certifications and credentials.

GCIH

GIAC Certified Incident Handler

SANS / GIAC

Security incident handling and response, attack and defence techniques.

SANS

GCFA

GIAC Certified Forensic Analyst

SANS / GIAC

Advanced forensic analysis, digital investigation and evidence collection.

SANS

OSCP

Offensive Security Certified Professional

Offensive Security

Penetration testing, vulnerability exploitation and offensive techniques.

Offensive Security

GREM

GIAC Reverse Engineering Malware

SANS / GIAC

Malware reverse engineering, static and dynamic analysis of malicious code.

SANS

CTIA

Certified Threat Intelligence Analyst

EC-Council

Cyber threat intelligence production and exploitation.

EC-Council