Ali Mokabbery Senior Security Consultant Toronto, ON Status: Hunting

Defending modern environments,
one signal at a time

Field notes from a security consultant with five years in the SOC — incident response, threat hunting, detection engineering, and the slow craft of separating real threats from noise.

Incident Response Threat Hunting Detection Engineering SIEM & SOAR DFIR MITRE ATT&CK

Five years deep in the SOC, and still learning every shift.

I'm a Senior Security Consultant with five years leading SOC and incident response operations across enterprise environments at Deloitte and BDO Canada. My day-to-day lives at the intersection of alert triage, log analysis, threat detection, and incident containment — the work of separating real adversaries from background noise.

I specialize in analyzing technical content and behavioral signals to detect and classify phishing, malware, and exploit attempts using Azure Sentinel, CrowdStrike, Splunk, QRadar, and LogRhythm. I've spent that time getting good at proactive threat hunting, playbook development, and the kind of automation that makes detection sharper instead of louder.

~ / about.sh
ali@mokabbery:~$ cat profile.json
{
  "name": "Ali Mokabbery",
  "role": "Senior Security Consultant",
  "experience_years": 5,
  "focus": ["IR", "Threat Hunting", "Detection Engineering"],
  "education": "H.B.Tech Informatics & Security · Seneca Polytechnic",
  "location": "Toronto, ON",
  "open_to": "new opportunities"
}
ali@mokabbery:~$

The tools I actually use.

Not a list of every product I've touched — these are the ones I reach for first, the ones I've broken and rebuilt enough to trust under pressure.

SIEM & Detection

  • Azure Sentinel
  • Splunk
  • IBM QRadar
  • LogRhythm
  • ArcSight
  • Graylog
  • Security Onion · Wazuh

EDR & Endpoint

  • CrowdStrike Falcon
  • Microsoft Defender for Endpoint
  • FireEye · Carbon Black
  • Live response & triage

SOAR & ITSM

  • Demisto (Cortex XSOAR)
  • ServiceNow
  • Jira
  • AutoTask

Scripting & Automation

  • Python
  • PowerShell
  • Bash
  • Ansible
  • KQL

Offensive Security

  • Nmap · Burp Suite
  • Metasploit · Hydra
  • Ettercap · Dirbuster

Defensive Security

  • Linux & AD hardening
  • Azure Entra ID
  • Conditional Access · MFA
  • IAM · PAM
  • Firewall configuration

Reverse Engineering

  • IDA Pro · Ghidra
  • OllyDbg · Assembly
  • Volatility · Regshot
  • FakeNet · Sandboxing

Digital Forensics

  • Autopsy · Scalpel
  • Volatility · Binwalk
  • Steghide · hex analysis
  • NTFS / FAT internals

Networking

  • Wireshark · TCPDump
  • OSI · TCP/IP · PKI
  • DNS · mail protocols

Virtualization & Cloud

  • Microsoft Azure
  • VMware ESXi · Hyper-V
  • Proxmox · Docker · LXC

Frameworks

  • MITRE ATT&CK
  • NIST IR lifecycle
  • Pyramid of Pain
  • Cyber Kill Chain

Home Lab

  • IPS / IDS
  • Security Onion deployment
  • DNS sinkhole · domain filtering
  • Malware analysis sandbox
  • Local AD test env

Where I've worked.

A short trace of the places I've spent time, from L1 monitoring at a Canadian bank to leading IR at a Big Four firm.

Dec 2022 — Mar 2026

Senior Security Consultant

// BDO Canada LLP · Toronto

Led incident response across MDE and CrowdStrike for enterprise clients, driving rapid containment of active threats. Investigated security incidents using Azure Sentinel and KQL, uncovered indicators of compromise, and ran proactive threat hunts in client environments. Built a tool to validate threat-intel feed IOCs that cut false-positive alerts by 35% and meaningfully sharpened detection accuracy.

Oct 2021 — Dec 2022

Senior Security Analyst

// Deloitte LLP · Toronto

Conducted cybersecurity incident investigations through Jira and Demisto — analyzed logs and alerts, identified root causes, and reduced average resolution time by streamlining the response workflow. Ran historical and incident-specific searches across ArcSight and Sentinel, automated daily report summaries with Python, and maintained the playbooks the team used in the field.

Mar 2020 — Aug 2020

Cyber Security Analyst (Co-op)

// CIBC · Toronto

Monitored the SOC using ArcSight and RSA, escalating events to reduce breach exposure. Built early hands-on with FireEye, Carbon Black, BlueCoat, and Proofpoint, and worked alert investigations using Autopsy and Volatility to pinpoint root causes and recommend remediation.

Jan 2012 — Mar 2020

Technical Support Representative

// Xerox Canada · Ottawa & Toronto

Eight years of hands-on diagnostics, ticketing-system triage, and root-cause analysis. The work that quietly built the troubleshooting reflex I rely on every day in the SOC.

A few things I'm proud of.

35%
False Positives ↓

Built an IOC-validation tool that cross-checked threat-intel feeds against context, cutting false-positive alerts by 35% and freeing the SOC to focus on real signal.

C3X
National Finalist

Finalist in the Canadian Collegiate Cyber Exercise (2019). Defended an Active Directory environment as part of a blue team in a high-pressure live-fire exercise.

5y
In the SOC

Five years of continuous incident response and threat hunting at Deloitte and BDO — the kind of repetition that turns frameworks into instincts.

3.4
GPA · Honours

Honours Bachelor of Technology, Informatics & Security, from Seneca Polytechnic. Active in Defcon416, OWASP, TASK, and SecTor — still attending.

· · · · · · · · ·

Recent field notes.

Short essays on detection, response, and the work of defending real environments. Replace with your own when you start publishing.

2026.01.27

The 3 a.m. runbook test

If your IR playbook only works when you're awake, it doesn't work. Notes on writing for the worst version of yourself.