Wilson Achiri
Skills
Extensive experience with SIEM platforms including Elastic, IBM QRadar, and Splunk Enterprise Security. Skilled in endpoint security technologies such as CrowdStrike, Carbon Black, Microsoft Defender, Symantec Endpoint Protection, Tanium, and McAfee. Proficient with forensics and monitoring tools including FireEye NX/EX/HX, Varonis, Proofpoint, and Tenable. Knowledgeable in network security technologies including Palo Alto, Juniper, and Junos firewalls. Experienced with administrative and compliance platforms such as Google Admin Console, eDiscovery, and Google DLP, as well as ticketing and collaboration systems including Helix, Jira, ServiceNow, and Confluence. Strong scripting capability in Python and PowerShell for automation, enrichment, and operational efficiency.
About
EXECUTIVE SUMMARY
Certified Cyber Security Analyst with more than eight years of progressive experience supporting federal and enterprise environments through advanced threat detection, vulnerability remediation, and full lifecycle incident response. Demonstrates strong capability in SIEM engineering, endpoint security, malware analysis, and threat hunting operations, with a proven record of strengthening organizational defenses through process optimization, automation, and operational discipline. Recognized for elevating SOC performance through structured training, onboarding programs, and knowledge management initiatives that accelerate analyst readiness and improve response consistency. Brings extensive experience collaborating with cross functional teams to protect mission critical systems and ensure the confidentiality, integrity, and availability of federal information assets.
PROFESSIONAL EXPERIENCE
ElectroSoft – SOC Analyst II Lead (BEP) December 2023 – August 2025
Led enterprise level monitoring and analysis across Elastic, Splunk ES, and QRadar environments, driving rapid identification and mitigation of emerging threats. Directed the creation of custom detection logic, advanced queries, and IOC driven analytics to enhance visibility and reduce dwell time. Conducted in depth malware analysis and executed proactive threat hunting operations across diverse network environments, integrating intelligence feeds and internal telemetry to uncover malicious activity and systemic weaknesses. Strengthened SOC maturity by developing SOPs, AARs, onboarding materials, and standardized playbooks that improved workflow consistency for Tier 1 and Tier 2 teams. Delivered workshops, tabletop exercises, and targeted coaching sessions that elevated analyst technical capability and reduced incident resolution time. Oversaw shift handovers, ensured continuity of operations, and coordinated with internal and external stakeholders to support comprehensive incident containment, eradication, and recovery.
Universal Service Administrative Co. (USAC) & U.S. Patent and Trademark Office (USPTO)
Incident Responder / IT Security Analyst October 2021 – October 2023
Executed advanced endpoint detection and response investigations using FireEye HX, CrowdStrike, Carbon Black, McAfee, and Cylance to identify behavioral anomalies, malware artifacts, and adversary techniques. Utilized Splunk ES and IBM QRadar to perform correlation analysis, anomaly detection, and timeline reconstruction, enabling rapid identification of Indicators of Compromise and Indicators of Attack. Designed and maintained Python and PowerShell automation scripts that streamlined alert triage, enriched log data, and reduced mean time to detect and respond. Collaborated with CSIRT teams to investigate and remediate high severity incidents involving ransomware, credential abuse, lateral movement, and APT related activity. Produced detailed incident reports, executive summaries, and SOC performance metrics to inform leadership decision making and support continuous improvement. Conducted hypothesis driven threat hunts to uncover misconfigurations, persistence mechanisms, and stealthy adversary behavior, strengthening overall network and endpoint resilience.
Digital Management Inc. – Senior SOC Analyst (State of Maryland) February 2018 – October 2021
Supported a 24/7 SOC environment by monitoring, analyzing, and responding to security events across IDS, SIEM, and endpoint protection platforms. Investigated phishing campaigns, malicious domains, and suspicious network activity using OSINT and advanced threat intelligence sources. Delivered real time incident analysis and containment recommendations to reduce risk and maintain operational continuity. Supported vulnerability management efforts through scanning, prioritization, and remediation coordination. Documented incident workflows and ensured alignment with Tier 2 and Tier 3 best practices to maintain consistency and compliance across SOC operations.