Amanpreet Singh Matharu — Operations Associate
I am a Cyber Security Infrastructure and Detection Engineer with hands-on experience across SOC operations, detection engineering, incident response, and secure infrastructure design. My background combines strong infrastructure fundamentals with advanced defensive security, allowing me to build controls that work reliably in real operational environments. My experience includes designing and operating SIEM-based detections using Microsoft Sentinel (KQL) and Splunk (SPL), working closely with SOC teams to investigate incidents, tune alerts, reduce false positives, and improve detection quality. I build detections aligned to MITRE ATT&CK, covering identity abuse, MFA fatigue, PowerShell misuse, ransomware indicators, suspicious authentication behaviour, and lateral movement. I have strong hands-on experience with endpoint and identity security, including Microsoft Defender XDR, Defender for Identity, Azure AD / Entra ID, MFA, Windows security logging, Sysmon, and endpoint encryption. I have implemented BitLocker via Group Policy and worked extensively with Active Directory design, naming standards, and GPO enforcement to enable scalable security controls. From an infrastructure perspective, I bring practical knowledge of TCP/IP, DNS, DHCP, VLANs, firewalls, VPNs, and traffic analysis using Wireshark. I have designed DNS security monitoring pipelines, including DNSSEC-enabled recursive resolution, secure log forwarding, and SIEM-based detection of malicious and anomalous domains. My early career included NOC and data centre operations, network rack builds, device configuration, and enterprise server migration support. Alongside industry work, I have delivered advanced cybersecurity teaching in SIEM operations, incident response, Active Directory attacks, threat hunting, and CTF-based defensive security. This experience strengthened my ability to document incidents clearly, communicate risk to non-technical stakeholders, and align technical controls with organisational needs. Overall, I bring infrastructure depth, SOC maturity, and strong ownership, and I am seeking a role where I can contribute immediately to security operations while continuing to grow as a detection-focused security engineer.
Stackforce AI infers this person is a Cybersecurity professional with a focus on detection engineering and incident response.
Location: London, England, United Kingdom
Experience: 5 yrs 10 mos
Skills
- It Infrastructure Management
- Incident Response
- Detection Engineering
- Cybersecurity Education
Career Highlights
- Expert in detection engineering and incident response.
- Hands-on experience with SIEM tools like Splunk and Microsoft Sentinel.
- Strong background in cybersecurity education and training.
Work Experience
Guard IQ
System Administrator (3 mos)
University of West London
Cyber Security Lecturer (3 yrs 4 mos)
Amorino Ealing
General Manager (4 yrs 1 mo)
Self-Directed / Independent
Cyber Security Detection Engineering — Independent Projects (5 yrs 4 mos)
Nagarro
Information Technology Analyst (1 yr 9 mos)
Education
Master's degree at University of West London
Master's degree at Jetking
Bachelor's degree at Guru Nanak Dev University