•Spearheaded real-time monitoring and analysis of security events using Splunk and LogRhythm SIEM platforms, leveraging nearly 5 years of experience across multiple domains.•Developed custom dashboards and alerts tailored to the specific security requirements of a life insurance company, enhancing situational awareness and incident response capabilities.•Demonstrated proficiency in TCP/IP protocols, network architecture, and packet analysis to effectively troubleshoot and secure network infrastructure.•Deployed and managed Symantec Endpoint Protection (SEP) across organizational endpoints, bolstering defenses against advanced threats and malware.•Valuable experience in analyzing IAM logs, IAM application server logs, provisioning server logs to troubleshoot various authentication/endpoint related issues.•Experience in Identity and Access Management (IAM) security operations, policy, governance, development, testing and access control provisioning.•In-depth knowledge of AWS cloud services like Compute, Network, Storage and Identity and Access Management. Provide IT Governance, Risk, and Compliance (GRC) service to fulfill client requirements.•Good experience to provide remediation consultation to organizations and system owners, ensuring vulnerabilities are remediated.•Utilized Wireshark and Suricata for network security monitoring, analyzing network traffic to identify and investigate suspicious activity and potential security incidents.•Conducted regular vulnerability assessments using Tenable Nessus and Qualys, identifying and prioritizing security vulnerabilities for proactive remediation.•Integrated Snort intrusion detection system (IDS) for real-time threat detection and prevention, enhancing the organization's ability to defend against cyber threats.•Managed and optimized Proofpoint TAP and TRAP for comprehensive email protection, including advanced threat detection and email quarantine, safeguarding against phishing attacks and email-borne threats.•Experienced in Communication and Computer Science, with expertise in Cybersecurity, Incident Response, Information Security, MITRE ATT&CK and NIST standards, Ethical Hacking, Penetration Testing, Databases, Microsoft Surface, Network Security, Security Engineering, Vulnerability Management, and leading Technical Discussions.