Operations & Experience
Cyber Security Analysis & Threat Intelligence
I am a dedicated Digital Analyst specializing in Cyber Security. My focus lies in threat analysis, digital forensics, and proactive defense strategies. Driven by a continuous learning philosophy, I actively research emerging vulnerabilities and advocate for robust, system-wide security postures. My goal is to secure digital infrastructures and contribute to global networking initiatives to counter evolving threats.

Operational Engagements
Defensive Tech Corp • London, UK (Remote)
Led security assessments, responded to incidents, and maintained SIEM platforms for a multinational organization.
As a core member of the Cyber Security team, I took charge of the daily monitoring and response operations. Our infrastructure processed millions of events per hour, requiring sharp analytical skills and automation.
Key Achievements
- Incident Response Time: Reduced MTTR (Mean Time to Respond) by 35% through custom automation playbooks.
- SIEM Tuning: Fine-tuned our Splunk dashboards to eliminate 60% of false positives.
- Global Collaboration: Coordinated with international teams during the log4j vulnerability patching, ensuring global compliance within 48 hours.
InfoSec Services • New York, USA
Conducted preliminary analysis of network traffic and assisted in vulnerability scanning for client networks.
My entry into professional cyber security began here. I learned the ropes of managing scans, interpreting raw network traffic, and building comprehensive reports for stakeholders.
Responsibilities
- Regular external and internal vulnerability scans using Tenable Nessus.
- Packet analysis using Wireshark to investigate anomalous internal communications.
- Delivered executive summaries and technical remediation plans to C-level staff.
Education & Certifications
M.Sc. in Information Security and Digital Forensics.
Coursework Highlights
- Advanced Cryptography
- Reverse Engineering Malware
- Secure Software Architecture
My master's thesis focused on the application of machine learning algorithms for behavioral analysis of network intrusions. It served as a foundational pillar for my continuous learning journey.