Security Operations · Detection Engineering · Automation

Jawwad Syed Security   Ops.

SOC analyst with deep enterprise experience in threat detection, incident investigation, and response. Currently building toward detection engineering and security automation roles where analysis translates directly into better coverage.

CrowdStrike Falcon Splunk Microsoft Defender Proofpoint KQL
76K+
Alerts Investigated
2,900+
Threats Triaged
120K+
Malicious Emails Blocked
Scroll
CrowdStrike Falcon
Splunk SIEM
Microsoft Sentinel
Proofpoint
KQL
MITRE ATT&CK
Velociraptor
Wireshark
Microsoft Defender XDR
VirusTotal
YARA Rules
Python Automation
ServiceNow ITSM
Threat Hunting
CrowdStrike Falcon
Splunk SIEM
Microsoft Sentinel
Proofpoint
KQL
MITRE ATT&CK
Velociraptor
Wireshark
Microsoft Defender XDR
VirusTotal
YARA Rules
Python Automation
ServiceNow ITSM
Threat Hunting

Representative Activity

90-Day Period
Large Enterprise Environment
8,700+
Endpoints Protected
76,000+
Alerts Investigated
2,900+
Threats Triaged
2,000+
ML Detections
800+
Malware Detections
40+
IOC Detections
2,400+
Files Quarantined
200+
Processes Killed

The stack I work in.

Not a certification list. These are the platforms and tools I use daily in a production enterprise environment.

EDR / Endpoint
CrowdStrike Falcon Microsoft Defender for Endpoint Defender XDR Velociraptor Endpoint Isolation Process Tree Analysis
SIEM / Log Analysis
Splunk Microsoft Sentinel KQL SPL (Splunk Query Language) Log Correlation Detection Rule Writing
Email Security
Proofpoint Microsoft Defender for O365 Header Analysis SPF / DKIM / DMARC Phishing Investigation Bulk Remediation
Threat Intelligence
VirusTotal Shodan URLScan.io AlienVault OTX MITRE ATT&CK IOC Enrichment
Investigation & Forensics
Wireshark Process Monitor Autoruns Any.run Sandbox Memory Analysis YARA Rules
Automation & Workflow
Python PowerShell ServiceNow Jira Regex API Integrations
Security Operations Analyst
Large Enterprise Environment
EDR / Endpoint Response
SIEM Investigation (KQL / SPL)
Phishing Analysis
IOC Blocking & Enrichment
Containment & Response
Detection Validation
Threat Hunting Support
Automation Scripting
Tier 2 / 3 Investigations

Handle escalated alerts requiring deep analysis: process chain review, lateral movement checks, privilege escalation patterns, and multi-stage attack reconstruction. Building a complete picture of what happened, not just closing tickets.

EDR & Endpoint Response

Daily hands-on work in CrowdStrike Falcon and Microsoft Defender for Endpoint. Reviewing execution chains, isolating hosts, killing processes, and quarantining files at enterprise scale across 8,700+ endpoints.

Phishing & Email Investigations

End-to-end investigations using Proofpoint and Defender for O365: header analysis, link detonation, attachment sandboxing, user scope assessment, credential exposure checks, and coordinating bulk remediation.

Detection Validation & Tuning

Working with SIEM detection rules in Splunk and Sentinel to reduce false positive noise. Documenting where rules over-trigger or miss coverage. Contributing detection improvements aligned to MITRE ATT&CK.

Automation & Reporting

Building Python and PowerShell scripts to automate repetitive investigation steps and IOC lookups. Producing written incident reports for escalated cases with clear timelines, affected scope, and remediation recommendations.

What I bring to the table.

I started in IT support, the kind of role where you develop a practical instinct for how systems actually behave under pressure. That foundation made the move into security operations a natural fit. I understand the infrastructure I'm defending, not just the alerts firing on top of it.

Over the past several years I've worked as a SOC analyst at enterprise scale: 8,700+ endpoints, 76,000+ alerts investigated, three different EDR platforms, two major SIEMs. The experience has built a pattern recognition that doesn't come from courses or labs.

The work I'm focused on now sits upstream from triage: writing detection content that actually catches attackers rather than generating noise, building automation that removes manual steps from the investigation pipeline, and developing threat hunting capability that finds what the ruleset misses.

Get in touch
Target Roles

Where I'm focused

Senior SOC Analyst, Detection Engineer, Threat Hunter, Security Automation Engineer. Roles where deep investigation experience directly improves security posture.

Background

IT roots, security trajectory

IT support to enterprise SOC. Built the infrastructure intuition first, then applied it to security. The combination is harder to find than either alone.

Environment

Enterprise scale

Retail enterprise: 8,700+ endpoints, high alert volume, mature security stack, cross-functional collaboration with IT, networking, and IR teams.

Certifications

Google Cybersecurity Professional Certificate · CompTIA Security+ (in progress)

Let's talk.

If you're building a detection engineering team, scaling a SOC, or need someone who can bridge analysis and automation, reach out.

Message sent. I'll get back to you shortly.