Protecting
Systems. Managing
Risk. Strengthening
Security.
Information Security professional with 8+ years of experience in Endpoint Security, Incident Response, and Security Operations. Transitioning toward Information Security Governance, Risk Management, and Compliance (GRC). Currently preparing for CISA.

About Me
I am an Information Security professional with over eight years of experience in endpoint protection, threat investigation, and enterprise security operations. My career has focused on defending systems from malware, ransomware, and advanced threats while supporting governance, risk management, and compliance initiatives.
I have hands-on experience in security monitoring, incident investigation, endpoint security management, and security KPI reporting. I am currently preparing for the Certified Information Systems Auditor (CISA) certification to deepen my expertise in security auditing, risk assessment, and compliance management aligned with ISO/IEC 27001 frameworks.
Core Skills
Experience
- Investigate security incidents from endpoint protection systems and perform threat analysis
- Implement security controls to reduce risk from malware, ransomware, and unauthorized access
- Produce weekly and monthly security reports with threat KPIs and incident metrics
- Document security procedures, operational processes to support governance & compliance initiatives
- Conduct security awareness training and share threat intelligence updates with employees
- Configure endpoint policies, device control, firewall rule exceptions aligned with business requirements
- Analyzed application logs to detect operational issues and security anomalies
- Performed root cause analysis and collaborated with engineering teams to resolve vulnerabilities
- Supported production issue resolution while maintaining system reliability and security
- Managed enterprise endpoint security operations and incident response activities
- Provided clients remote support for malware protection, OS attack prevention, and security monitoring
- Assisted in securing critical infrastructure including email, database, and web servers
- Conducted advanced threat investigations and recommended mitigation and remediation strategies
Certifications
Education
Languages
Interests
Get in Touch
Feel free to reach out for collaborations, cybersecurity consulting, or professional opportunities.