Post Job Free
Sign in

Cybersecurity Analyst with Incident Response Expertise

Location:
Woodbridge, VA
Salary:
180000
Posted:
April 13, 2026

Contact this candidate

Resume:

Shumaila S.

571-***-****

********.****@*****.***

PROFESSIONAL SUMMARY

I am a Cybersecurity Analyst with over 8 years of hands-on experience monitoring and responding to threats across global enterprise and healthcare environments. I have a strong background in investigating SIEM and XDR alerts, analyzing endpoint and identity activity, and performing root cause analysis using process trees and causality chains. I have worked extensively with tools such as Microsoft Sentinel, Defender, CrowdStrike, and Cyberhaven to detect, contain, and remediate security incidents. My experience includes threat hunting, phishing analysis, and data loss prevention, with a focus on protecting sensitive data and maintaining operational continuity. I have also mentored junior analysts, supported SOC operations, and helped improve workflows through automation and practical use of AI-driven capabilities. I hold CompTIA Security+ and SecAI+ certifications and bring a solid foundation in modern security operations and incident response.

TECHNICAL COMPETENCIES

TrendMicro MS Defender Vade Secure ThreatSpike

M365 Azure CarbonBlack CrowdStrike EntraID

Sentinel Palo Alto XDR/ XSOAR Vectra QRadar

XSOAR IronPort / ProofPoint Tanium CryoServer

Recorded Future SharePoint Confluence Heat / Remedy ServiceNow Qualys CyberHaven (DLP) JIRA

EDUCATION & TECHNICAL CERTIFICATIONS

KHI University - Bachelors of Science 2007

CompTIA Sec AI+ 2026

CompTIA Security+ CE 2023

ITIL V3 2015

PROFESSIONAL EXPERIENCE

Worldwide Flight Services (WFS) 01/2024- Present

Cyber Security Analyst

Monitor and investigate security alerts across North America and EMEA, triaging and responding to potential threats in a timely manner

Provide consistent security coverage, including after-hours support when needed to maintain operational continuity

Manage and track security incidents through Threatspike, ensuring proper escalation, documentation, and follow-through

Investigate XDR alerts by analyzing endpoint, network, and identity telemetry to determine scope and impact

Perform root cause analysis using process trees and causality chains to understand how threats originated and propagated across systems

Analyze suspicious processes, command-line activity, registry changes, and network connections to identify indicators of compromise

Conduct deep-dive investigations into endpoint activity, including lateral movement, persistence mechanisms, and privilege escalation attempts

Correlate alerts across multiple tools (SIEM, EDR/XDR, email security, identity platforms) to build a complete picture of security incidents

Investigate identity-based threats within Entra ID, including suspicious sign-in activity, impossible travel events, atypical user behavior, and risky logins

Analyze authentication logs, conditional access policies, and MFA activity to identify potential account compromise or misuse

Respond to identity alerts by validating user activity, enforcing remediation actions, and coordinating account security measures

Work closely with regional IT teams to verify patching efforts and confirm decommissioning of end-of- life systems

Support Microsoft Sentinel by monitoring alerts, identifying gaps in coverage, and tuning detections to reduce false positives

Use automation and AI-supported features within security tools to help prioritize alerts, reduce noise, and improve response efficiency

Apply behavioral analysis and anomaly detection techniques to identify suspicious activity and reduce time to detection

Assist in refining detection logic using data trends and insights gathered from ongoing investigations

Create and maintain alert response templates for Threatspike and Microsoft Defender to standardize handling and improve consistency

Develop and document incident response processes, including event mapping for high-priority and recurring alerts

Write and maintain SOPs for common alerts and investigations to improve team efficiency and consistency

Perform threat hunting activities using known indicators, threat intelligence, and environmental baselines to proactively identify risks

Analyze phishing emails in a sandbox environment, including those with malicious attachments, links, and QR codes

Partner with engineering and security teams to improve visibility, close detection gaps, and strengthen monitoring capabilities

Train and mentor junior analysts and new hires, providing hands-on support and guidance during onboarding

Help onboard new and senior team members by walking them through tools, processes, and day-to- day operations

Identify gaps in current workflows and suggest improvements, including opportunities to automate repetitive tasks

Stay current with emerging trends, including practical uses of AI in security operations, and apply them where they add value

Cleveland Clinic 01/2019 – 12/2023

SOC Analyst

Monitored security events across clinical and corporate systems, maintaining visibility into threats that could impact patient care and hospital operations

Triaged alerts from SIEM, EDR, DLP, and network security tools, validating true positives and driving appropriate escalation based on risk and impact

Investigated suspicious activity across endpoints, servers, and user accounts, with a strong focus on protecting PHI and other sensitive healthcare data

Led incident response activities, including containment and remediation actions such as host isolation, account lockdowns, and coordination with IT and clinical teams

Performed deep log analysis across Windows systems, network devices, and security platforms to identify anomalies and indicators of compromise

Conducted phishing investigations targeting hospital staff, analyzing email headers, attachments, and links to determine intent and scope

Worked extensively with DLP controls to monitor, investigate, and prevent unauthorized data exfiltration across endpoints, email, and cloud platforms

Reviewed and responded to data loss incidents, validating user intent and coordinating remediation with business and compliance teams

Utilized AI-driven security tools, including Cyberhaven, to detect abnormal data movement, insider risk, and sensitive data access patterns

Leveraged behavioral analytics and AI insights to prioritize alerts and uncover threats that may not be visible through traditional detection methods

Performed proactive threat hunting using threat intelligence, known indicators, and environmental baselines to identify hidden risks

Supported vulnerability management efforts by identifying exposed systems and partnering with infrastructure teams to track remediation

Collaborated with compliance, privacy, and clinical stakeholders to ensure security practices aligned with healthcare regulations and internal policies

Created and maintained SOPs and runbooks for common alert types, incident response procedures, and DLP investigations to improve team consistency

Documented incidents end-to-end, including timelines, root cause, and lessons learned, ensuring clear reporting to leadership and audit readiness

Assisted in tuning detection rules and improving use cases to reduce false positives and enhance overall SOC efficiency

Managed and administered security tools, including onboarding new log sources, maintaining integrations, and ensuring optimal performance and coverage

Participated in tool evaluations and contributed to implementation of new security capabilities, including AI-driven detection platforms

Provided on-call support and responded to high-priority incidents outside standard hours to maintain continuous security coverage

Mentored junior analysts and supported knowledge sharing across the team, helping improve investigation quality and response times

Identified gaps in monitoring and response workflows, recommending automation and process improvements to strengthen SOC operations

Ulta Beauty, INC. 02/2017- 12/2018

Cyber Security Analyst

Monitored enterprise security posture across retail, eCommerce, and corporate environments, ensuring visibility into threats impacting customer data, payment systems, and business operations

Reviewed and assessed alerts from SIEM, EDR, identity platforms, and cloud security tools, validating activity and prioritizing response based on business risk

Led investigations involving endpoint, network, and user activity, identifying suspicious behavior and determining potential impact to systems and data

Responded to security incidents from initial detection through containment and recovery, coordinating with IT, engineering, and business teams to minimize disruption

Analyzed authentication activity, access patterns, and privilege usage to identify misuse, account compromise, or unauthorized access attempts

Performed detailed log analysis across Windows, cloud services, and security platforms to uncover anomalies and confirm indicators of compromise

Investigated phishing attempts and social engineering activity targeting corporate users, validating intent and recommending remediation actions

Supported data protection efforts by monitoring sensitive data movement and investigating potential data loss scenarios across endpoints and cloud applications

Conducted proactive threat hunting using threat intelligence, behavioral patterns, and internal baselines to identify hidden or emerging threats

Contributed to improving detection capabilities by identifying gaps, refining use cases, and tuning alert logic to reduce noise and improve accuracy

Maintained clear and consistent documentation of investigations, including timelines, findings, and response actions for reporting and audit purposes

Worked closely with cross-functional teams to strengthen security controls, improve visibility, and support ongoing security initiatives

Assisted in managing and optimizing security tools, ensuring proper integrations, coverage, and performance across the environment

Developed and updated internal procedures and playbooks to support consistent handling of alerts and incidents across the team

Participated in efforts to streamline workflows, including identifying opportunities for automation and improving overall response efficiency

Stayed current on evolving threats, attack techniques, and security technologies, applying practical knowledge to day-to-day operations

REFERENCES

Available Upon Request



Contact this candidate