Designs done whilst working at IBM Security

Some of these are confidential and hence only limited visuals will be provided. Contact for more details.

IBM Security Connections Customs Connector

Problem statement: There are currently no platform UI that allows users to add custom connectors. This is a pain point for customers, as it prevents them from adding specialized data into the platform that they will need to support various integrations.

Impact:

  • Delivered designs for all-new custom connectors experiences

  • Conducted extensive research to validate designs

  • Improved 3 key areas in workflow (adding, error troubleshooting, etc)

Original As-is

To-Be end design

Key numbers: My proposed design and journey map got positive feedback from 7+ users and stakeholders through respondent tools and I’ve continued to iterate based off feedbacks from them. So far they have a 100% success rate of completion of tasks.

“The one thing I wanted to actually say again, is that the ability to pull logs. I would... if anything goes wrong, just by that button is very nice. It's very helpful.” - Respondent user 4

“ In data dog, there’s no feedback or telling you why. so its good that we have the reason in this design.” - Respondent user 5

“Your leadership on our UCP workflow related squads has not gone unnoticed this first half of 2023. This is why it was my pleasure to nominate you for the SCHIIT Award on behalf of our team. You directly contribute to the success of our team, and design teammates by using critical thinking, keeping our users in mind, and using your stakeholder relationships to make sure all of our work is informed by agile collaboration.” - Jp, Connections team lead

IBM Security Data Explorer

Simplified Threat hunting experience for analysts

Impact:

  • Re-designed/delivered the threat-hunting experience for MSS for 10 different step commands.

  • Delivered a better user experience for IBM SOC analysts and innovated based on current constrains.

  • Aligned design with user need statements:

  • As a security analyst, I need to run hunts without the need to know the Kestrel hunt language so that I can move quickly and investigate my hypothesis.

  • As a security analyst, I need to have out-of-the-box examples so that I can learn, modify and run them within the threat hunt environment.

  • Designs included in the MVP: Visual builder, Advanced builder, Updated with new commands, Importing jupyter notebooks files, Improved user experience (Added documentation within steps), Add multiple statements in a more intuitive way, Exporting jupyter files.

IBM Security SOAR Playbooks

A recent red dot award winner - Playbook is the set of tools, conditions, business logic, flows and tasks used to respond to security events and threats in a Security Orchestration, Automation, and Response (SOAR) environment.

Given the intricate nature of my role, I collaborate closely with developers, security architects, and project managers on a daily basis. During my recent assignment with the SOAR Playbooks team, I took ownership of the end-to-end process for multiple projects, including Essentials offerings, Dashboard debugging, Looping/Goto, and role-based user access/audit user functionalities.

My responsibilities have included conducting competitive audits and undertaking research roles, resulting in significant contributions to the strategic direction across various products. Within the SOAR domain, I swiftly gained extensive domain knowledge and established myself as a subject matter expert (SME), enhancing my understanding of users through continuous engagement with end users, sales teams, and marketing stakeholders.

Previous
Previous

Design eminence - IBM Jumpstart design mentorship (Hyperblue AI)

Next
Next

Password Helper Experience for Postmedia Network Inc