- Location
- Toronto, Ontario, Canada
- Bio
-
π Iβm a Tier 1 SOC Analyst at ISA Cybersecurity, actively triaging 30β60 tickets daily across IBM QRadar, SentinelOne, and Trellix platforms.
π Certified in Threat Hunting, Endpoint Administration, and Palo Alto Cybersecurity Fundamentals, I specialize in identifying threats, escalating incidents, and reducing false positives to improve security posture.
π Currently pursuing my diploma in Computer System Technologies (Networking & Cybersecurity) at Seneca College, Iβm passionate about Blue Team operations, threat detection, and protecting organizations against evolving cyber threats.
πΉ SIEM | EDR | XDR | MITRE ATT&CK
πΉ 24/7 SOC Operations | Incident Triage | Malware ContainmentLetβs connect if you're passionate about cybersecurity, SOC operations, and continuous learning!
- Portals
-
-
Vancouver, British Columbia, Canada
-
Skills
Socials
Achievements


Latest feedback
Recent projects
Work experience
Cybersecurity analyst
ISA Cybersecurity
Toronto, Ontario, Canada
October 2025 - Current
- Triaged 30β60 tickets daily using IBM QRadar, identifying threats from log data across multiple client environments.
- Used SentinelOne to monitor endpoint behaviour, configure exclusions, and isolate compromised systems.
- Leveraged Trellix XDR to analyze correlated threat events across email, endpoint, and network vectors.
- Applied MITRE ATT&CK techniques to assess and escalate incidents, reducing false positives through tuning initiatives.
- Operated in a 24/7 SOC shift rotation and collaborated with Tier II teams for high-severity threat cases.
- Triaged 30β60 tickets daily using IBM QRadar, identifying threats from log data across multiple client environments.
- Used SentinelOne to monitor endpoint behaviour, configure exclusions, and isolate compromised systems.
- Leveraged Trellix XDR to analyze correlated threat events across email, endpoint, and network vectors.
- Applied MITRE ATT&CK techniques to assess and escalate incidents, reducing false positives through tuning initiatives. - Operated in a 24/7 SOC shift rotation and collaborated with Tier II teams for high-severity threat cases.
Technical Support Engineer & Network Analyst Intern
Noki Systems Inc
Toronto, Ontario, Canada
August 2024 - January 2025
- Troubleshoot and resolve over 3 systems per week, achieving a 95% first-contact resolution by mastering remote desktop support tools.
- Led the deployment and configuration of systems on the cloud, managing the full lifecycle from testing to production launch, ensuring seamless transitions and minimizing downtime.
- Configured Raspberry Pi 4 and CM4 modules for diverse applications, including Wi-Fi, LTE, and hardware performance optimization, conducting rigorous electrical and system testing.
- Monitored cloud systems and networks for anomalies, identifying and diagnosing issues related to power, battery, network, and software.
- Collaborated closely with software engineers, assisting with test executions and escalating complex software issues for resolution.