Open to senior SOC & detection roles

Detection. Response.
Measured.

I'm Rezwan — a Senior SOC Analyst & Detection Engineer with 6+ years building 24×7 security operations across enterprise and healthcare. I turn high-volume telemetry into outcomes you can audit.

Green Card holder Public Trust eligible No sponsorship required 📍 Alexandria, VA
Security analyst workspace
Rezwan Uzzaman
Rezwan Uzzaman
Senior SOC Analyst · Detection Engineer
monitoring · 24×7

Trusted across enterprise & healthcare

AmeriSave UnitedHealth Group Ventois

// PROVEN OUTCOMES

Measured impact, not just activity.

Every project ships with metrics — because security operations only matter when leadership can see them.

0%
Time-to-Detect
0%
MTTR
0%
True Positives
0%
Alert Noise
0%
EDR Coverage
0%
Patch Compliance

// WHAT I DO

Three things I do exceptionally well.

I'm not a generalist. My value is in the detection-to-response loop — engineering high-fidelity signals, leading the response when they fire, and automating everything in between so the team scales.

Code on screen

Detection Engineering

High-fidelity correlation rules and behavioral analytics in Splunk & Microsoft Sentinel — packaged in MITRE ATT&CK-mapped runbooks your team can actually use.

  • KQL / SPL detection development
  • UEBA watchlists & baselining
  • Suppression logic & tuning
Cyber alert visualization
🚨

Incident Response

End-to-end IR for phishing, malware, ransomware, and lateral movement — with structured RCAs and post-IR reports executives understand.

  • Host containment via EDR/XDR
  • Forensic triage & evidence chain
  • Threat hunt campaigns
Server automation lights
⚙️

SOAR & Automation

Python and PowerShell playbooks that enrich alerts, ticket automatically, and contain hosts — turning a noisy queue into a force-multiplier.

  • REST/JSON API integrations
  • ServiceNow + EDR orchestration
  • Audit-ready evidence templates
Server room

// HOW I WORK

A repeatable approach to defense.

Every program follows the same disciplined rhythm — so improvements compound and outcomes hold up to audit.

01

Map the surface

Inventory log sources, agents, and identity boundaries against MITRE ATT&CK to find blind spots first.

02

Engineer high-fidelity signal

Author detections with thresholds, suppression, and enrichment built in — not bolted on later.

03

Automate the response

Wrap repeatable triage in SOAR playbooks so analysts spend their time on the 5% that needs a human.

04

Document for the auditor

Every detection ships with a runbook, evidence template, and dashboard ready for ISO, SOC 2, or HIPAA review.

// SELECTED WORK

Case studies, not job descriptions.

Three programs that defined my last six years — each with a clear challenge, a deliberate approach, and numbers leadership tracked.

Network operations
01 / Enterprise 2022 – 2026

Scaling 24×7 SIEM at AmeriSave

Senior SOC Analyst · Atlanta, GA

Challenge

A 1,200-alerts-per-day queue was burning analysts out and audit cycles were leaning on tribal knowledge.

Approach

Re-architected correlation logic in KQL/SPL, deployed 12 SOAR playbooks across VirusTotal/OTX/Defender APIs, and packaged every hunt into MITRE-mapped runbooks.

−68%
Time-to-detect
+40%
True positives
98%
IR SLA met

Compressing the vuln-to-fix window at UHG

Information Security Risk Analyst · Minneapolis, MN

Challenge

Critical CVEs were taking 96 hours to reach remediation in a HIPAA-bound healthcare estate. Email-borne phishing was the dominant initial-access vector.

Approach

Bridged ServiceNow with Qualys/Tenable in Python/Bash, hardened Defender for Office 365 with ZAP and custom transport rules, and recalibrated Splunk routing.

−62%
CVE close time
−41%
Phish CTR
−55%
MTTA
Healthcare cybersecurity
02 / Healthcare 2021 – 2022
Network cables
03 / Greenfield 2019 – 2020

Standing up an MSSP SIEM from zero

Junior Security Analyst · Ventois, MA

Challenge

No SIEM, no IDS, no playbooks — just raw log volume and a small team that needed to ship 24×7 monitoring.

Approach

Architected the Wazuh + ELK + Suricata stack from scratch, onboarded 20+ log sources, and authored 15 custom decoders with behavioral baselines.

55→92%
Log coverage
−50%
Per-alert handling
+26%
Alert precision

// THE STACK

Tools I use every day.

Battle-tested across enterprise SOC, healthcare security, and MSSP environments.

SIEM

Splunk (SPL), Microsoft Sentinel (KQL), Wazuh, ELK Stack

EDR / XDR

Defender for Endpoint, SentinelOne, CrowdStrike Falcon

Network & IDS

Suricata, Snort, Wireshark, tcpdump, NetFlow, Nmap

Automation

Python, PowerShell, Bash, REST/JSON, SOAR playbooks

Cloud & IAM

Entra ID, Okta, Azure Security, Conditional Access, MFA

Vuln Mgmt

Qualys VMDR, Tenable, Nessus, OpenVAS, Burp Suite

Threat Intel

VirusTotal, AlienVault OTX, MITRE ATT&CK, UEBA

Compliance

ISO 27001, SOC 2, HIPAA, NIST 800-53, CIS Controls

Ops & Reporting

ServiceNow, Jira, Confluence, Executive Dashboards

// CERTIFIED

CompTIA Security+
Azure Security Engineer Associate
Splunk Core Power User
Qualys VM
Cisco Ethical Hacker
Fortinet Cybersec
Google Cybersecurity
Working at desk
FR
Rezwan Uzzaman
@rezwanz
📍 Alexandria, VA ● Available

// ABOUT

A short version.

I started in network packet analysis at a small MSSP and grew into senior detection engineering work for Fortune 50 healthcare and enterprise mortgage. Six years in, I still believe the best SOC isn't the loudest one — it's the one whose detections are quiet because they're tuned, automated, and trusted.

I write detections in KQL and SPL, automate the boring parts in Python, and document everything so the next analyst — or auditor — can pick up where I left off.

Education
M.S. CIS
Rivier University
Years in field
6+ years
Since 2019
Certifications
7 active
Security · Cloud · Tools

// LET'S TALK

Need a senior SOC operator who measures the work?

I'm currently exploring senior SOC, detection engineering, and incident response roles. Public Trust eligible, US-based, no sponsorship required.

Location
Alexandria, VA