Incident Response & Operational Efficiency
During my time as an Information Security Analyst, I played a key role as the “first line of defense,” serving as the initial point of detection, triage, and escalation for security events. I was responsible for analyzing alerts, distinguishing true threats from noise, and ensuring high-risk activity was promptly escalated to the appropriate teams. Throughout my time as an analyst, I helped ensure incidents were identified early, handled efficiently, and transitioned seamlessly into remediation workflows.
I also helped strengthen incident response processes by designing and implementing automation-driven workflows that significantly improved detection-to-response timelines. By combining alerting, collaboration, and orchestration, I helped transform reactive processes into streamlined, near real-time response mechanisms that reduced mean time to respond (MTTR) and improved overall operational effectiveness across multiple client environments.
I was able to achieve this by:
Alerting, Automation & Rapid Response (MTTR Reduction)
I leveraged Microsoft Power Automate and webhook integrations to build automated alerting that ensured high and critical security alerts were immediately surfaced to the right teams. This eliminated delays caused by manual monitoring and triage, enabling faster awareness and action. This was accomplished through:
Designing Power Automate workflows that ingested alerts from security platforms and triggered real-time notifications into dedicated Microsoft Teams channels.
Utilizing webhooks to ensure seamless, low-latency delivery of high-priority alerts directly into collaboration spaces where responders were already active.
Prioritizing high and critical alerts to reduce noise and ensure immediate visibility into the most impactful threats.
Dramatically reducing MTTR by removing manual steps in the alerting and escalation process, enabling teams to move from detection to action in near real time.
Collaborative Incident Response & Team Orchestration
I focused heavily on ensuring that the right people were engaged as quickly as possible during an incident. I designed a collaboration model within Microsoft Teams that aligned directly with client environments and response needs. This included:
Creating dedicated Teams channels for each client, ensuring all relevant stakeholders (security, infrastructure, endpoint, and leadership teams) were pre-aligned and immediately reachable during incidents.
Structuring channels to support efficient communication, clear ownership, and rapid decision-making during active incidents.
Enabling faster cross-team coordination by removing the need to manually identify and engage stakeholders during high-pressure situations.
Improving response effectiveness not just at the point of detection, but throughout the entire remediation lifecycle by ensuring the appropriate teams were engaged from the outset.
Incident Response Across the Entire Lifecycle
My approach to incident response extended beyond detection and notification. I focused on enabling a cohesive, end-to-end process that supported rapid triage, investigation, and remediation. This was achieved through:
Standardizing response workflows to ensure consistency across clients while still accommodating environment-specific nuances.
Reducing friction in escalation paths by embedding communication directly into the tools and platforms teams were already using.
Supporting faster containment and remediation by ensuring technical teams had immediate access to actionable alert data and context.
Continuously refining processes based on real-world incident handling to improve speed, accuracy, and overall response maturity.
By integrating automation, intelligent alerting, and structured collaboration, I helped drive a measurable improvement in incident response efficiency, reducing MTTR, improving visibility, and enabling teams to respond to threats with speed and precision.
Notable Incident Investigations
Click below to explore a selection of notable incident response investigations I’ve led and contributed to.
-
Investigated numerous instances of suspected BEC activity, beginning with analysis of phishing vectors, email headers, and user interaction to confirm initial access.
Reviewed sign-in logs for anomalous authentication (impossible travel, unfamiliar IPs) and identified if any unauthorized access patterns were present.
Contained the threat by resetting credentials, revoking active sessions, and removing any malicious inbox rules and forwarding configurations used for persistence.
Conducted tenant-wide threat hunting to identify additional affected users and related indicators of compromise.
Blocked malicious domains, IPs, and sender artifacts to prevent additional compromise.
Coordinated user communication and awareness to mitigate further risk.
Completed post-incident hardening by strengthening Conditional Access policies, improving end-user Security Awareness, and documenting findings to improve detection and response playbooks.
-
Investigated mail bombing campaigns impacting multiple users, coupled with threat actors impersonating help desk personnel via phone to induce credential theft and remote access.
Identified the attack through abnormal email volume spikes, sender pattern analysis, and user reports of suspicious calls.
Contained the attack by implementing mail flow rules to block and rate-limit inbound mailflow, tuning anti-spam filtering, content inspection and geographical restrictions.
Secured affected users by validating account activity, resetting credentials, and ensuring no persistence mechanisms (inbox rules, forwarding) were established.
Responded to a confirmed user interaction where access was granted to a threat actor by immediately isolating the endpoint, initiating forensic analysis, and reviewing process, network, and authentication activity to determine scope.
Verified no lateral movement or additional system compromise occurred and remediated the device to a trusted state.
Conducted tenant-wide threat hunting to identify additional impacted users and indicators of compromise.
Restored normal operations by clearing mail floods and validating mail flow.
Completed post-incident hardening through enhanced user awareness, stricter email filtering policies, and improved detection for combined volumetric and social engineering attacks.
-
Led investigation and response to multiple malware infections originating from Gootloader, delivered through SEO poisoning that redirected users to compromised websites hosting malicious JavaScript payloads.
Analyzed initial infection vector by reviewing browser history, download artifacts, and script behavior to confirm execution chain.
Identified payload staging activity, including obfuscated script execution and delivery of secondary malware.
Contained the threat by isolating affected endpoints, terminating malicious processes, and removing persistence mechanisms.
Leveraged EDR telemetry to trace execution paths, registry changes, and any signs of lateral movement.
Conducted environment-wide threat hunting for related indicators of compromise, including file hashes, domains, and behavioral patterns associated with Gootloader campaigns.
Verified no additional systems were impacted and restored affected devices to a trusted state. Completed post-incident hardening by reinforcing web filtering, restricting script execution, and educating users on risks associated with search result manipulation and malicious downloads.
-
Investigated an internal account compromise that resulted in large-scale outbound spam activity.
Identified initial access through analysis of risky sign-ins, anomalous geolocation, and authentication patterns, confirming unauthorized access to the user account.
Detected abuse through spikes in outbound email volume, unusual sending behavior, and user reports (both external and internal) of suspicious messages originating from the compromised account.
Contained the incident by immediately disabling the account, resetting credentials, and revoking active sessions.
Removed malicious inbox rules and forwarding configurations used for persistence and evasion.
Conducted tenant-wide threat hunting to identify additional compromised accounts and related indicators of compromise, including IP addresses, domains, and message patterns.
Verified no further lateral movement or privilege escalation occurred.
Restored account functionality securely and ensured mail flow normalization.
Completed post-incident hardening by strengthening Conditional Access policies, and tuning anti-spam (outbound) protections in Defender for Office to detect and prevent similar outbound abuse scenarios.