Toheeb Image
Toheeb A. Husain
Cloud Security Engineer
Location: Northampton, England

Open to cloud security, SOC, and detection engineering opportunities with hands-on experience across Microsoft Sentinel, Chronicle SIEM/SOAR, KQL, Terraform, Microsoft Azure, Google Cloud, Security Command Center, and cloud incident response.

About me| Projects| Skills| Certifications| Experience| Education| Awards| Open-source| Volunteering| Contact| Links
View CV GitHub LinkedIn Email Me

About me

I am a cloud security professional focused on threat detection, incident response, and securing cloud environments through better visibility, access control, and automation.

My hands-on experience spans cloud security operations, SIEM/SOAR, IAM, logging, monitoring, and infrastructure security across Microsoft Azure and Google Cloud. I have worked with tools including Microsoft Sentinel, KQL, Terraform, Logic Apps, Microsoft Entra ID, Defender for Cloud, Chronicle, and Security Command Center.

Across recent projects and internship work, I have:

Target roles: Cloud Security | SOC Operations | Threat Detection | Detection Engineering | SIEM/SOAR Automation

I am particularly interested in roles where I can help security teams turn cloud telemetry into actionable detection, improve response workflows, and build secure, maintainable cloud environments.

Cloud security professional focused on Microsoft Sentinel, KQL, Terraform, cloud incident response, and secure-by-design cloud operations.

I am a cloud security professional focused on threat detection, incident response, and securing cloud environments through better visibility, access control, and automation.

My hands-on experience spans cloud security operations, SIEM/SOAR, IAM, logging, monitoring, and infrastructure security across Microsoft Azure and Google Cloud. I have worked with tools including Microsoft Sentinel, KQL, Terraform, Logic Apps, Microsoft Entra ID, Defender for Cloud, Chronicle, and Security Command Center.

Across recent projects and internship work, I have:

Target roles: Cloud Security | SOC Operations | Threat Detection | Detection Engineering | SIEM/SOAR Automation

I am particularly interested in roles where I can help security teams turn cloud telemetry into actionable detection, improve response workflows, and build secure, maintainable cloud environments.

Cloud security professional focused on Microsoft Sentinel, KQL, Terraform, cloud incident response, and secure-by-design cloud operations.

What really gets me excited

I am most engaged by areas of cybersecurity where technical depth meets real operational impact. The themes I keep coming back to are:

  • Detection engineering and how better telemetry, correlation, and context improve security outcomes.
  • Cloud identity and zero-trust design, especially around access governance and blast-radius reduction.
  • Security automation and how SIEM/SOAR workflows can reduce response time and analyst fatigue.
  • Emerging risks around AI, modern attack paths, and how defenders can adapt cloud security operations.

These are the areas where I want to keep growing: building practical detection content, improving incident response, and helping security teams make cloud environments more resilient.

My strongest interests are detection engineering, cloud identity security, SIEM/SOAR automation, and the operational side of modern cloud defense.


Projects

How to use this section

Each project card expands to show the business problem, my role, the tooling used, and the outcome.

Skills

Cloud Security
  • Google Cloud Platform (GCP), Microsoft Azure (Security focus), Identity & Access Management (IAM), Least Privilege & Access Control, Cloud Security Posture Management (CSPM)
SIEM & SOAR
  • Microsoft Sentinel (SIEM), Logic Apps (SOAR), Chronicle SIEM, Alert Investigation & Triage, Incident Detection & Response
Threat Detection & Response
  • Security Command Center (SCC), Log Analysis (Cloud Logging, Audit Logs), Indicators of Compromise (IoCs), Threat Hunting, Incident Response Lifecycle (NIST)
Cloud & DevSecOps
  • Terraform, Docker, Git / Version Control, CI/CD Basics, Secure Configuration Management
Threat Intelligence
  • OSINT Investigations, MITRE ATT&CK Framework, Cyber Kill Chain, Diamond Model of Intrusion Analysis, CTI Reporting & Analysis
Data & Monitoring
  • BigQuery (Log Analysis), SQL, Log Correlation, Monitoring & Alerting Concepts
Web & Backend
  • React, Next.js, FastAPI, Spring Boot
Programming
  • Python, Java, JavaScript, C++, PHP

Certifications


Experience


Education


Awards & Honors

Open-source Contributions

Volunteering


Featured Links


Contact

I am open to cloud security, SOC, and detection engineering opportunities. If you would like to discuss a role, project, or collaboration, feel free to reach out.

Toheeb A. Husain | toheeborelope@gmail.com | +44 7508859056


Download CV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV

SWIFTDEV