Summary
Overview
Work History
Education
Skills
Certification
Languages
Timeline
Generic

Atai Temir

Chicago

Summary

Dynamic SOC Analyst with proven expertise at BMO Financial Group, enhancing threat detection capabilities through SIEM management and vulnerability assessments. Recognized for reducing mean time to detection and fostering collaboration across teams. Adept at leveraging threat intelligence while demonstrating strong problem-solving skills in high-pressure environments.

Overview

3
3
years of professional experience
1
1
Certification

Work History

SOC Analyst

BMO Financial Group
07.2023 - Current
  • Monitored and triaged real-time security events using SIEM platforms such as Splunk, IBM QRadar, and LogRhythm, identifying potential threats and escalating incidents based on criticality and impact.
  • Utilized EDR tools like CrowdStrike Falcon, Microsoft Defender for Endpoint, and SentinelOne to investigate host-based anomalies, contain malicious activity, and support remediation efforts.
  • Conducted in-depth malware and threat analysis through sandboxing solutions such as Cuckoo Sandbox and Joe Sandbox, correlating findings with IOC feeds from platforms like VirusTotal and ThreatConnect.
  • Developed and tuned custom detection rules within SIEM and EDR environments to improve detection capabilities and reduce false positives, aligning with the MITRE ATT&CK framework.
  • Performed root cause analysis and forensic investigations using tools like Velociraptor, Autopsy, and Wireshark, ensuring thorough documentation and reporting of incidents.
  • Participated in proactive threat hunting exercises leveraging Elastic Stack, Sigma rules, and YARA, contributing to the development of new detection methodologies and threat intel enrichment.
  • Collaborated with cross-functional teams and threat intelligence platforms to contextualize alerts, track APT activity, and assess evolving attack surface risks.
  • Maintained up-to-date incident response runbooks and playbooks, integrating workflows with SOAR platforms such as Cortex XSOAR and Splunk Phantom to automate repetitive tasks and improve response time.
  • Contributed to continuous security posture improvement by providing feedback on log source coverage, control gaps, and tool integration strategies.
  • Reduced false alarms by fine-tuning intrusion detection system configurations based on historical analysis of incidents.
  • Analyzed and reported on security trends, providing actionable insights for strategic planning.
  • Collaborated with IT department to ensure seamless application of security policies across all technology platforms.
  • Updated security procedures and documentation, keeping pace with evolving cyber threats and industry best practices.
  • Mentored other analysts on the team

Cybersecurity Defense SOC

Equifax Inc
06.2022 - 07.2023
  • Monitored and investigated real-time security events across a global infrastructure using Splunk ES and Microsoft Sentinel, reducing mean time to detection (MTTD) by 35% through refined alert logic and contextual enrichment.
  • Conducted complex incident triage and response operations leveraging CrowdStrike Falcon, FireEye HX, and ServiceNow SecOps, consistently mitigating threats before lateral movement or data exfiltration occurred.
  • Partnered with threat intelligence teams to map IOCs and TTPs to MITRE ATT&CK, creating intelligence-backed detections tailored to Equifax’s risk profile and industry-specific threat landscape.
  • Led root cause analysis for escalated incidents, integrating findings into knowledge bases and playbooks.
  • Collaborated with architecture and engineering teams to harden security controls and improve visibility across cloud-native workloads (Azure, AWS) and legacy systems.
  • Spearheaded the development of SOAR workflows in Cortex XSOAR, automating phishing analysis and containment tasks.
  • Participated in purple team exercises and tabletop simulations, validating the effectiveness of incident response plans and refining team coordination under pressure.
  • Engaged in continuous process improvement initiatives, feeding back actionable insights into tool tuning, log source onboarding, and detection strategy enhancements.
  • Maintained strict adherence to internal audit, compliance, and data governance frameworks, aligning SOC operations with Equifax’s global regulatory obligations (PCI-DSS, SOX, GDPR).
  • Self-motivated, with a strong sense of personal responsibility.
  • Worked effectively in fast-paced environments.
  • Skilled at working independently and collaboratively in a team environment.
  • Proven ability to learn quickly and adapt to new situations.

Education

Bachelor of Science - Criminal Justice

Northeastern Illinois University
Chicago, IL

Skills

  • Vulnerability assessment
  • Endpoint security
  • SIEM management
  • Threat intelligence
  • Penetration testing
  • Social engineering
  • Risk assessment
  • Data encryption
  • Information governance
  • Web security
  • Bash scripting
  • Data loss prevention

Certification

CompTIA Security+

Languages

English
Native or Bilingual
Russian
Native or Bilingual

Timeline

SOC Analyst

BMO Financial Group
07.2023 - Current

Cybersecurity Defense SOC

Equifax Inc
06.2022 - 07.2023

Bachelor of Science - Criminal Justice

Northeastern Illinois University
Atai Temir