Behavior analytics rollout for a defense agency
A DoD client's SOC was drowning in volume from disparate EDR, identity, and proxy feeds. Mean time to detect on credential abuse exceeded 24 hours.
Re-architected the Splunk detection pipeline. Migrated 140+ legacy correlation searches into ATT&CK-mapped, validated detection content. Stood up UEBA modeling for cleared user populations.