Ahmed Nader

SOC Analyst Tier 2
🪙 2000 / month

About Candidate

Location

Education

B
Bachelor of Engineering in Electronics & Communications 2022
Higher Technological Institute

Work & Experience

S
SOC Analyst Tier 2 11/2024 - Present
Paysky

- Perform in-depth analysis of escalated alerts and incidents from Tier 1,
conducting root cause analysis to determine the scope and impact of security
events.

- Conduct dark web monitoring to identify leaked employee credentials and
advise on proactive mitigation actions.

- Develop and refine detection rules and correlation logic to improve overall
threat visibility.

- Utilize Microsoft Defender for Endpoint (MDE) to investigate alerts across user
endpoints.

- Execute threat hunting activities based on intelligence, Indicators of
Compromise (IOCs), and behavioral patterns.

- Support ISO 27001 and PCI DSS audit cycles by documenting SOC playbooks,
responsibilities, and assisting in policy updates.

S
SOC Analyst Tier 1 11/2023 - 10/2024
Corelia

- Monitored alerts from SIEM and EDR tools and triaged events for escalation to
Tier 2.

- Investigated logs from various sources including Firewalls, WAF, Proxies, and
IDS/IPS.

- Performed real-time event correlation and initial incident triage.

N
Network Security Trainee 10/2023 - 11/2023
National Telecom Institute

- Secured networks using Cisco ASA, Firepower, and FortiGate appliances.

- Implemented firewall rules, VPNs, and IPS configurations.

Skills

SIEM: IBM QRadar, Wazuh, ELK, Splunk.
Network Security: IDS/IPS (Suricata, Zeek, Snort), Cisco ASA, FortiGate.
EDR & Monitoring: Microsoft Defender for Endpoint, F-Secure, Elastic Defend, Dark Web Monitoring.
Digital Forensics: File & Disk Analysis (FAT/NTFS), Data Acquisition & Preservation, Windows Forensics (Registry, Artifacts), Timeline Reconstruction.
Forensic Tools: FTK Imager, Autopsy, Sleuth Kit, Volatility, Wireshark, TCPDump.
Scripting: Python, Bash, PowerShell (Automating forensic artifact collection).
Operating Systems: Windows, Linux.