Actively seeking Remote SOC Analyst / Threat Detection roles — open to global opportunities!
I’m a cybersecurity professional with hands-on SOC experience, currently based in Pakistan and available for fully remote positions worldwide. Here’s what I bring to the table: 🛡️ SIEM & Log Analysis Working daily with IBM QRadar, Wazuh, and LogRhythm — building correlation rules, triaging alerts, and reducing false positives at scale. 🎯 EDR & Endpoint Security Hands-on with CrowdStrike, Kaspersky KATA/EPP, and Cisco AMP for endpoint threat detection, containment, and response. 🔍 Threat Hunting & IR Active threat hunting using IOC-based and hypothesis-driven methodologies. Experienced across the full Incident Response lifecycle — from detection through containment, eradication, and lessons learned. 📡 Network & Data Security Suricata IDS rule tuning, OPNsense firewall log analysis, phishing email investigation, and IBM Guardium for data security monitoring. I thrive in fast-paced environments where alerts are noisy, adversaries are creative, and every log tells a story. Remote-first mindset, async-ready, and serious about building a long-term career in detection engineering or tier-2/3 SOC work. 📩 DMs open — let’s connect if your team needs a sharp analyst who hits the ground running. 🌍 Timezone flexible — available for US, EU, and APAC shifts. Pakistan-based, fully remote setup ready. #CyberSecurity #SOCAnalyst #ThreatHunting #IncidentResponse #RemoteWork #OpenToWork #SIEM #BlueTeam #InfoSec #Find Hiring Managers that would hire you.