IT Security professional focused on incident response, threat monitoring, and access management across enterprise environments. Experienced in SIEM analysis, vulnerability assessment, and identity control using tools like IBM QRadar, Microsoft Defender, and BeyondTrust. Combines strong technical foundations with data analysis and operational insight to strengthen security posture and streamline processes.
A collection of security, analytics, and system expertise in one place
A security-focused professional skilled in monitoring, analysis, and system operations across enterprise IT environments.
▪ Threat monitoring
▪ Incident analysis
▪ Vulnerability assessment
▪ Log investigation
▪ IBM QRadar, Microsoft Defender, Tenable Nessus
▪ Access provisioning
▪ Privileged account control
▪ RBAC implementation
▪ Credential rotation
▪ Microsoft Intune, BeyondTrust, SCCM
▪ Data analysis
▪ KPI reporting
▪ Dashboard creation
▪ Trend visualization
▪ PowerBI, SQL, Excel, Python
▪ Scripting
▪ Backend logic
▪ Network programming
▪ System troubleshooting
▪ C, C++, Java, Python, Linux
Developed a predictive analytics pipeline using Python, NLP, and machine learning techniques to process large text datasets, generate sentiment-based insights, and produce KPI dashboards for performance trend analysis.
Built a Power BI dashboard integrating SQL and Excel logs to monitor enterprise endpoints, track risk and compliance KPIs, and automate reporting workflows to improve operational efficiency.
Configured a virtual enterprise network environment using VMware, implementing Active Directory, VLAN segmentation, and firewall rules to simulate real-world network security scenarios and troubleshooting.
Engineered a multi-threaded C-based network chat application supporting concurrent communication sessions with optimized thread handling, UDP messaging, and improved runtime stability.
IT security professional who strengthens enterprise systems through proactive threat monitoring, access control, and structured incident response practices.
Experienced across IT security, technical support, and operational service environments with a strong focus on system reliability and compliance.

Handled high-volume customer account interactions, analyzed billing records, and applied structured workflows to ensure accurate documentation and compliant issue resolution.

Monitored SIEM alerts, performed vulnerability assessments, and managed privileged access controls while supporting remediation efforts across enterprise systems.

Provided Tier 1 and Tier 2 support, managed user access through Active Directory, and improved issue resolution efficiency through network troubleshooting and reporting.
Strengthens expertise in networking, security, and system operations for real-world IT environments.
Feel free to reach out for collaboration, projects, or inquiries. Connect via email or LinkedIn!