MDR & EDR operations
24/7 monitoring and triage with FortiEDR—separating real threats from noise, hunting proactively, and driving incident response through containment, remediation, and threat intel.
Tactical Threat Analyst (MDR) · FortiEDR · Detection engineering
I turn noisy endpoint telemetry into clear, actionable outcomes—for analysts and customers
24/7 monitoring and triage with FortiEDR—separating real threats from noise, hunting proactively, and driving incident response through containment, remediation, and threat intel.
Deep experience with Microsoft Defender for Endpoint: telemetry analysis, tuning and suppressions, APT-style emulation, and mapping coverage to MITRE ATT&CK so escalations land with evidence.
Python and APIs for repeatable workflows; growing depth in AWS, Kubernetes, and EKS. I also ship full-stack security tools—see the AI-driven EDR + RAG project (React, Lambda, Bedrock).
I’ve been curious about cyber security since my first semester in college—that’s when the journey really started. Since then I’ve stayed close to what’s new in technology, gone to technical conferences and community events, and I learn as much from talking to people as from the sessions.
Professionally, I work in MDR at Fortinet with FortiEDR—monitoring, triage, and incident response. Before that I was a security researcher on Microsoft Defender for Endpoint at LTI Mindtree.
I’m active in the community as a core team member at BSides Bangalore, I volunteer at other security conferences when I can, and I also volunteer with The Art of Living—community events and mindfulness alongside a busy work life.
Away from keyboards I like travel and trekking, fitness, meditation, and reading—they reset my head and keep me patient when incidents run long. I’m still the person who shows up for new tech, good conversations, and hard problems; the tools change, but the thread from that first-semester interest to today is the same.