Aspiring SOC Analyst | Threat Intelligence | Microsoft Sentinel (KQL)
Security Studies graduate with a strong interest in cybersecurity, threat intelligence, and AI-driven analysis.
Iโm currently building hands-on experience across detection engineering, OSINT investigations, and security data analysis โ with a focus on turning intelligence into real-world security insights.
- Threat intelligence research & OSINT investigations
- Detection engineering using Microsoft Sentinel (KQL)
- Security log analysis & behavioural detection
- AI-assisted investigation workflows
Developed an OSINT-driven threat profile analysing the Gootloader infection chain, mapped behaviours to MITRE ATT&CK, and created Microsoft Sentinel detection logic to identify related activity.
Built a Microsoft Sentinel project using KQL to simulate real-world SOC workflows, including detection of brute force activity, suspicious logins, and lateral movement. Designed triage processes to prioritise and investigate security alerts.
Researched and documented emerging cyber threats, techniques, and indicators, focusing on identifying patterns and translating intelligence into actionable insights.
Conducted hands-on analysis of security logs to investigate suspicious activity, using KQL queries and event data to identify anomalies and support incident investigation.
Used prompt engineering to transform unstructured legal text into structured data, demonstrating the application of AI for data analysis and automation.
Designed and tested prompt workflows to generate personalised recommendations, exploring how AI can be used to structure and interpret user data.
Cybersecurity โข Threat Intelligence โข Artificial Intelligence โข Data Analysis
Opportunities in:
- Security Operations (SOC)
- Threat Intelligence
- Cybersecurity Analysis
๐ Open to roles in New York