About Me

Who I Am

I have a background in identity access management (IAM), system administration, and IT compliance. My practical skills include conducting vulnerabilities assessments, automating security configurations, and securing cloud environments. I use tools like Microsoft Defender for Endpoint and Microsoft Sentinel for threat hunting and monitoring.

Skills

What I Do

Monitor Security Alerts and Events

monitor security tools, such as SIEM (Security Information and Event Management) systems, intrusion detection systems (IDS), and firewalls, for real-time alerts on potential threats or suspicious activities.

Investigate and Triage Incidents

Perform initial investigations into security alerts to determine their severity and legitimacy and triage incidents by prioritizing them based on risk, impact, and urgency, escalating critical issues.

Respond to Security Incidents

Take immediate action to contain and mitigate threats, such as isolating infected systems, blocking malicious IPs, or resetting compromised accounts.

Analyze Threats and Vulnerabilities

Conduct threat intelligence analysis to understand attack vectors, tactics, techniques, and procedures (TTPs) used by adversaries.

Document and Report Findings

Maintain detailed records of incidents, investigations, and response actions for compliance, auditing, and future reference.

Improve Security Processes and Tools

Collaborate with SOC teams to fine-tune detection rules, reduce false positives, and enhance monitoring capabilities.

Projects

Cybersecurity Projects

GET IN TOUCH

contact-img

Loughton Bennett

Cybersecurity Support Technician

Connect with me via Linkedin, email, a phone call, or leave a message here.

Phone: +1 910 999 7409 Email: loughton11@yahoo.com