Automated Threat Remediation
Manual incident response times were averaging 4 hours for standard malware alerts, leaving the network vulnerable to lateral movement. Security analysts were overwhelmed by false positives.
Architected a SOAR (Security Orchestration,
Automation, and Response) workflow using
Microsoft Sentinel.
1. Ingestion: Syslog and API connectors
aggregate logs from firewalls and endpoints.
2. Detection: Custom KQL queries identify
anomalous behavior patterns mapped to MITRE
ATT&CK.
3. Response: Azure Logic Apps trigger an
automated isolation of the compromised VM via
Azure CLI, blocking all outbound traffic immediately.
- ✓ Reduced MTTR from 4 hours to 30 seconds.
- ✓ Eliminated 95% of Tier-1 analyst triage time.