Security Analyst Work
Threat monitoring, vulnerability assessment, incident response support, and security reporting. Focused on practical improvements that reduce risk and increase visibility.
Detection
Investigated alerts, validated events, and escalated confirmed incidents.
Response
Supported containment & remediation planning with IT leadership.
Prevention
Reduced attack surface through patching, hardening, and policy updates.
Work Overview (Video)
A short walkthrough of my security Training videos.
Core Responsibilities
- Monitored systems and networks for threats, anomalies, and suspicious behavior
- Performed vulnerability assessments and prioritized remediation actions
- Supported incident response: triage, evidence capture, containment recommendations
- Created security documentation and technical reports for stakeholders
Tools & Concepts
- Network & endpoint investigation (logs, traffic patterns, IOC checks)
- Vulnerability workflows (risk ranking, patch validation)
- Security baselines: least privilege, secure configs, segmentation
- Clear reporting for technical + non-technical audiences
My Security Process
- Detect: Monitor alerts & telemetry, identify unusual behavior
- Validate: Confirm whether the event is malicious or false positive
- Contain: Recommend steps to isolate systems and stop impact
- Remediate: Patch, harden configurations, rotate credentials if needed
- Report: Summarize findings, evidence, impact, and next steps
- Improve: Update detection rules and policies to prevent repeat incidents
Outcomes
- Improved monitoring visibility and reduced time to confirm suspicious activity
- Strengthened security posture through remediation planning and hardening
- Produced clear security reports supporting compliance and leadership decisions
- Helped standardize security workflows for repeatable response