API Security & Threat Detection Programme
Slashed attack detection time from 200+ days to under 5 minutes and automated remediation for 94% of incidents.
98%
attacks detected
<1s
detection latency
200d → 5m
median detection time
94%
incidents auto-remediated
Role
Lead Technical Business Analyst — Security
Timeline
Q1–Q2 2024 · 5 months
Delivery context
The Problem
Enterprises had no visibility into API attack patterns. Traditional security tools missed sophisticated attacks. The security operations team was drowning in false positives and had no structured incident triage process — which meant real threats were lost in noise.
My Contribution
I mapped the current-state security operations workflow, identified the gap between raw alert volume and actionable incident intelligence, and documented the functional requirements for the behavioral anomaly detection and triage system. I facilitated workshops with security operations and engineering teams to define alert classification categories and automated remediation boundaries. I authored the incident triage process and operational runbook for the security operations team, ensuring system outputs were actionable for analysts across varying levels of technical depth. I applied ITSM best practices — incident, change, and problem management — throughout the programme design.
The Solution
Requirements-led security programme: current-state security ops mapping, alert classification definition, automated remediation scope specification, incident triage workflow design, and an ITSM-aligned operational runbook for the security team.
Results
- 98% of attack attempts detected
- <1 second detection latency
- Median detection time: 200+ days → under 5 minutes
- 87 unique attack patterns identified in first 6 months
- 94% of attacks auto-remediated before data loss
- $2M+ in breach costs prevented
Security operations teams need actionable outputs, not raw data. The most important requirements work was defining what an 'actionable alert' looked like — what context, what recommended response, what escalation path. Getting that right upstream meant the system produced reports analysts could act on in minutes rather than raw logs they had to interpret for hours.
Tech Stack
Security
Tools
Methodology
Compliance
Related
How this project connects to the rest of my work.
Services
Work phases this project exemplifies
Proof metrics
Related projects
- Data Breach Response & Forensic ReportingCompressed breach detection from 210 days to 2 hours — with automated regulatory reporting that qualified for GDPR fast-response exemptions.
- Cloud Security Posture & Compliance AutomationAchieved 87% fewer security incidents and continuous SOC2/ISO compliance — reducing audit prep from 40 hours to 2 hours.