Candidate Name
Security-focused IT professional with deep expertise in Security Operations, delivering robust, end-to-end cybersecurity solutions across enterprise environments. I specialize in designing and implementing scalable security frameworks that protect infrastructure, data, and users.
Key competencies include:
SIEM & SOAR: Real-time threat monitoring, automated incident response, and security workflow orchestration.
Network Security: Deployment and management of Next-Generation Firewalls (NGFW) and Intrusion Prevention Systems (IPS) to safeguard network perimeters.
Endpoint Protection: Advanced Endpoint Detection and Response (EDR) and Endpoint Security solutions to defend against malware, ransomware, and insider threats.
Email Security: Mitigation of phishing, spoofing, and business email compromise (BEC) through layered email protection strategies.
Vulnerability Management: Proactive identification, prioritization, and remediation of security gaps across systems and applications.
Threat Intelligence & Threat Hunting: Leveraging global intelligence feeds and conducting deep-dive investigations to uncover hidden risks and reduce dwell time.
Access Control: Enforcing least privilege policies via Endpoint Privilege Management (EPM) to minimize attack surfaces and prevent lateral movement.
I bring a strategic mindset to cybersecurity, aligning technical solutions with business goals while ensuring compliance, resilience, and operational efficiency.
15/09/2025
03/01/2021
04/01/2019
01/01/2011
28/07/2012