top of page
shutterstock_1033306540.jpg

Rebecca Hudson

Security Operations & Incident Response Professional | Building Resilient Security Programs

Phone:

(469) 431-1687

Email:

  • LinkedIn
  • credly_logo_icon_247258_edited

About Me

As a Global Cybersecurity Analyst, I specialize in end-to-end incident investigation, tool optimization, and user education to strengthen security defenses and improve operational efficiency. With hands-on experience in tools like Palo Alto Cortex, IBM QRadar SIEM, SOAR, Microsoft Defender, and Entra Active Directory, I ensure potential security threats are identified, analyzed, and addressed with precision and speed.

​

In my role, I handle the full lifecycle of incident investigations -- analyzing logs, validating alerts, and escalating critical findings. I work across diverse environments, managing logs from EDRs like CrowdStrike and SentinelOne, firewalls such as Palo Alto and Cisco, and cloud platforms including AWS and Azure. By tuning monitoring rules and minimizing false positives, I streamline alert handling and improve the efficiency of security operations.

​

Collaboration and continuous improvement are at the heart of my work. I partner with team members and stakeholders to refine security tools, resolve user-reported issues, and implement effective solutions that enhance the organization’s overall security posture. I also contribute to user education by providing guidance on security best practices and helping create a culture of awareness and vigilance.

​

My passion lies in solving today’s security challenges while building scalable frameworks for the future. By blending my technical expertise with a proactive and collaborative mindset, I aim to empower teams, protect critical assets, and contribute to the evolving field of cybersecurity.

Experience

Currently on Career Sabbatical (2026)
Global Cybersecurity Engineer 

Yum! Brands
Global Cybersecurity Analyst

Carbon Helix
Security Analyst

 

Taking a planned career pause to focus on family while remaining active in the cybersecurity field through continued learning, certifications, and industry engagement.

In my role as a Global Cybersecurity Analyst, I focus on managing end-to-end investigations of potential security incidents for Yum! Brands' global eCommerce platforms. Leveraging tools such as Palo Alto Cortex, Microsoft Defender, and IBM QRadar, I analyze alerts, identify risks, and resolve security issues to strengthen the organization’s overall security posture.

​

My responsibilities include tuning monitoring rules and minimizing false positives to improve the efficiency of incident detection and response. By analyzing logs from a variety of sources—including firewalls, EDR platforms, and cloud services (AWS and Azure)—I ensure that incidents are thoroughly investigated and escalated with actionable details to the appropriate teams.

​

A significant part of my role involves optimizing and enhancing the security tools we use, implementing new monitoring rules, and refining configurations to stay ahead of evolving threats. I work closely with global stakeholders to provide insights and support for improving security processes, as well as educating end users on best practices to prevent future incidents.

Collaboration is critical to my success in this role. I partner with cross-functional teams to align our security strategies, share findings from investigations, and streamline workflows to ensure swift responses to potential threats. My proactive approach has contributed to reducing response times and improving the organization’s ability to detect and mitigate risks efficiently.

In my role as a SOC Analyst, I am responsible for the initial triage and analysis of security incidents across a wide variety of clients, ranging from small businesses to global enterprises. Leveraging tools such as IBM QRadar SIEM and SOAR, I monitor network traffic, investigate offenses, and escalate incidents based on threat severity. My focus is to ensure rapid identification of risks by gathering critical data—such as IP addresses, ports, and log sources—and then providing detailed incident reports for further client action. I work closely with my team to ensure that all incident notes are thorough, accurate, and aligned with client escalation protocols. Additionally, I utilize tools like IBM XForce and VirusTotal to validate IOCs, providing deeper insights to support investigations. Though I primarily handle initial triage, I have experience analyzing logs from EDRs, firewalls, and cloud services (AWS, AZURE, GCP), ensuring that I maintain a broad understanding of various environments. My role requires a high level of communication and collaboration, ensuring that clients are equipped with the information they need to respond quickly and effectively to potential security threats.

Education

Bachelor of Science in Cybersecurity (IP1)

American Public University Systems

My undergraduate degree in Computer Science has equipped me with a robust foundation in cybersecurity and risk management. Leveraging this knowledge, I have actively enhanced my current role, contributing to the ongoing success of the team and fostering continuous growth. As I embark on my career adventure, I am excited to apply and expand upon the skills and insights gained during my academic journey to make meaningful contributions to the dynamic field of cybersecurity

Professional Skillset

Focused Cybersecurity Expertise:
 

  • Incident Triage & Escalation:
    Skilled in initial threat analysis and rapid incident triage using IBM QRadar SIEM and SOAR, ensuring potential risks are quickly identified and escalated for client resolution. Consistently handled over 100 incidents per shift, maintaining a 98% SLA compliance rate for timely escalations.
     

  • Tool Proficiency:
    Extensive experience with tools like IBM XForce Threat Intelligence, VirusTotal, and SIEM platforms to investigate and analyze security incidents, validate IOCs, and provide actionable insights. Recognized for improving incident accuracy, leading to a 15% reduction in client escalations needing additional follow-up.
     

  • Log & Traffic Monitoring:
    Proficient in monitoring logs from diverse sources, including EDRs (CrowdStrike, SentinelOne), firewalls (Palo Alto, Cisco), and cloud environments (AWS, Azure), ensuring comprehensive threat coverage across varied platforms. Exposed to logs from over 50 unique client environments, developing a broad understanding of cross-platform security challenges.
     

Effective Collaboration & Communication:
 

  • Client Engagement:
    Strong communication skills, ensuring clear, detailed escalation reports to clients, enabling them to take swift and informed action on security incidents. Provided critical real-time insights during high-severity incidents, resulting in improved client response times by 20%.
     

  • Team Coordination:
    Collaborative problem-solver, working closely with SOC teams to ensure accurate incident notes, review findings, and maintain operational excellence. Frequently took on an informal leadership role within the team, helping mentor junior analysts and improving overall team efficiency by 10%.
     

  • Operational Accuracy:
    Known for attention to detail in incident documentation, ensuring all security events are thoroughly investigated and effectively communicated. This level of accuracy contributed to a 99% reduction in incident rework requests from clients.
     

Continuous Growth & Development:
 

  • Hands-on Expertise:
    Regularly handling incident investigations and triaging in a live SOC environment, maintaining up-to-date knowledge of evolving threats and attack vectors. Developed a reputation for quickly identifying critical issues, reducing average triage time by 30%.
     

  • Commitment to Learning:
    Driven by a passion for cybersecurity, continuously enhancing skills and knowledge through hands-on experience and exposure to various log sources and security platforms. Constantly seeking new certifications and training opportunities to stay ahead in the ever-evolving cybersecurity landscape.
     

  • Security Framework Familiarity:
    Knowledgeable in industry-standard practices and frameworks, ensuring adherence to best practices in cybersecurity operations, and consistently applying this knowledge to improve incident response procedures.

Thank you for visiting!

bottom of page