Noussayr Derbel
Senior Cybersecurity Engineer
Hands-on cybersecurity engineer with 5+ years of experience across SOC operations, consulting, and enterprise security engineering. I enjoy experimenting with new methodologies and tools, learning continuously, and playing CTFs whenever I feel like it. Alongside day-to-day technical work, I am steadily developing leadership through mentoring, knowledge sharing, and cross-functional collaboration to be ready for broader security responsibilities over time.
A high-level view of the security domains I work in most often, from incident response and detection engineering to architecture, communication, and mentoring.
Detailed capability areas from hands-on delivery, with the tools and frameworks most relevant to each domain.
Capability 01 Systems Architecture & Design Hybrid environments, network visibility, identity security, and automation workflows.
- Solid understanding of hybrid environments: on-prem infrastructure, Windows and Linux servers, Microsoft 365, and Azure AD / Entra ID.
- Network traffic analysis across routing, switching, proxies, VPNs, network segmentation, WAF, and SD-WAN.
- Design of automation workflows to handle repetitive or time-sensitive security tasks.
- Understanding of identity security architecture: privilege management, conditional access, MFA enforcement, and identity-based threat detection.
- Basic exposure to Azure and AWS activity monitoring and IAM review.
Capability 02 SOC Capability & Detection Engineering Log correlation, SOC capability building, platform operations, and SIEM migration exposure.
- Multi-source log correlation across Windows event logs, authentication logs, network telemetry, and EDR data.
- Contribution to SOC capabilities: log ingestion, normalization pipelines, detection rules, enrichment workflows, and MITRE ATT&CK mapping.
- Hands-on experience with Splunk, IBM QRadar, Microsoft Defender, Zscaler, and Cortex XSOAR.
- Experience reviewing security policies and assessing the consistency and coverage of existing controls.
- Exposure to SIEM migration projects, including log-source scoping, normalization schema design, and phased detection porting.
Capability 03 CTI, DFIR & Malware Analysis APT tradecraft, alert triage, threat intelligence tooling, and malware analysis environments.
- Good understanding of APT TTPs: social engineering, identity abuse, lateral movement, and exploitation of exposed services.
- Ability to translate attacker techniques into operational risks for IT teams, SOC analysts, and management, and update detection rules accordingly.
- Experience with threat intelligence tools: dark web monitoring, VirusTotal, CrowdStrike intelligence feeds, and IoC management.
- Alert triage and weak signal analysis: forming hypotheses and reconstructing incidents involving servers, clusters, or cloud environments.
- Understanding of both static and dynamic malware analysis: obfuscated scripts, encoded or compressed data, and basic transformations.
- Experience with analysis environments including Windows Sandbox, WSL, REMnux, Cuckoo Sandbox, Hybrid Analysis, and AnyRun.
Capability 04 Investigation Workflow & Detection Tuning Behavioral analysis, tool-driven investigations, and detection tuning across multiple log sources.
- Behavioral analysis: monitoring processes, file activity, network connections, and execution patterns.
- Ability to work through unknown code progressively, focusing on logic and critical functions rather than line-by-line review.
- Targeted testing of NGAV, EDR, proxies, and NDR to identify blind spots, with structured reporting back to vendor partners.
- Regular use of Sysinternals tools, Windows log analysis, packet capture, and Wireshark.
- Building coherent timelines and quickly separating legitimate artefacts from suspicious signals.
- Advanced use of CyberChef for deobfuscation and analysis of encoded or compressed content.
- Experience writing and tuning detection use cases across multiple log sources, mapped to MITRE ATT&CK tactics and techniques.
Capability 05 Knowledge Sharing & Mentoring Technical communication, workshops, mentoring, and internal documentation.
- Explaining technical topics clearly for different audiences, including non-technical stakeholders.
- Delivering educational presentations on attack chains, identity abuse, remote access risks, and exposed services.
- Designing workshop materials for IT and SOC teams on DFIR, CTI, advanced malware analysis, and Purple Teaming.
- Mentoring students and junior analysts on investigation projects, malware analysis, security audits, and tool development.
- Writing internal documentation: playbooks, detection summaries, post-incident reports, and onboarding guides.
- Reviewing and giving structured feedback on technical work, with a focus on building long-term competence.
Capability 06 Cross-Functional Skills & Professional Strengths Security posture improvement, structured communication, prioritisation, and leadership growth.
- Proactively identifying gaps and proposing practical improvements to the overall security posture.
- Staying focused and methodical under pressure, particularly during incident response situations.
- Risk-based prioritisation: evaluating impact, exposure, and exploitability to decide what matters most.
- Working well with local and global teams across IT, security, and business functions.
- Developing a leadership style based on consistency, guidance, and genuine interest in others' growth.
- Clear, respectful, and structured communication that helps others understand complex situations without unnecessary jargon.
- Comfortable managing multiple parallel workstreams: vendor PoVs, detection engineering, stakeholder coordination, and documentation.
- Strong attention to detail when producing structured deliverables: frameworks, reference documents, and technical reports.
Live integration from my Medium feed. This section shows only recent cybersecurity-focused articles.
Loading latest cybersecurity articles...
Formal education and continuous learning details from my background.
Open to senior cybersecurity engineering roles, consulting engagements, and teaching opportunities. Based in Tallinn, Estonia.
noussayr@security ~$ cat location.txt Tallinn, Estonia Open to remote and relocation options
noussayr@security ~$ cat languages.txt Arabic English French
noussayr@security ~$ cat status.txt [open] Available for opportunities
noussayr@security ~$