- Managed and maintained endpoints using SentinelOne EDR, including agent updates, patch management, reboots, troubleshooting, and performance optimization.
- Conducted continuous monitoring and detailed investigation of security alerts from SentinelOne; identified root causes and executed incident response protocols.
- Led incident response efforts—contained threats, remediated infections, performed system rollback, and documented lessons learned for team awareness.
- Performed threat hunting using SentinelOne visibility tools by analyzing endpoint behaviors, identifying anomalies, and searching for IoCs related to new APTs and malware strains.
- Monitored and reported application vulnerabilities; recommended security patching or version upgrades to customers to mitigate risks.
- Provided administrative support for endpoint OS issues by collecting and analyzing logs to resolve performance or security-related problems.
- Created comprehensive incident reports, including root cause analysis, impact assessments, and mitigation strategies, and communicated findings to stakeholders.
- Participated in digital forensics activities, including memory and disk analysis, to preserve and investigate evidence in line with legal and compliance requirements.
- Proactively recommended improvements to existing security controls, performed risk assessments, and helped refine incident response processes.
Key Skills & Competencies:
- Focus on incident response, and threat detection.
- Proficient in using tools such as SIEM, EDR, IDS/IPS, and firewalls for threat analysis and containment.
- Strong understanding of log formats and hands-on experience in log analysis (e.g., Syslog, Windows Event Logs).
- Hands-on experience in scripting with Python to automate and streamline incident response and detection workflows.
- Solid understanding of incident response methodologies (detection, containment, eradication, recovery).
- Strong sense of ownership, responsibility, and the ability to handle multiple high-pressure incidents effectively.
- Excellent analytical, problem-solving, and communication skills across technical and non-technical teams.
- Regularly stay updated with the latest cybersecurity trends, tools, and attack techniques to improve organizational defenses.
- Maintained up-to-date knowledge of industry trends and threat landscape through ongoing research and professional development activities.