Cybersecurity Analyst with over 3 years of progressive experience across 24x7 SOC environments, enterprise incident response, and secure software development. Skilled in using Microsoft Sentinel, Splunk, Defender for Endpoint, and QRadar to detect, investigate, and respond to cyber threats. Experienced in threat hunting, log correlation, IOC analysis, and endpoint/network monitoring using MITRE ATT&CK framework. Demonstrates strong communication skills through regular reporting and customer interactions, with a proven ability to provide actionable recommendations and reduce incident dwell time. Adept at working in high-pressure, on-call environments and continuously improving detection capabilities. Holds a Master’s in Applied Computer Science and certifications including Security+, Microsoft SC-200, and Azure Fundamentals.