Robin Poulose Edapilly

Robin Poulose Edapilly

Mumbai, Maharashtra, India
156 followers 153 connections

About

IT professional with 14 years of experience, including 10 years specialising in Microsoft…

Activity

Join now to see all activity

Experience

  • Tata Consultancy Services Graphic

    Tata Consultancy Services

    Mumbai, Maharashtra, India

  • -

    Querétaro, Mexico

  • -

  • -

    Mumbai, Maharashtra, India

  • -

    Mumbai

  • -

    Andheri

  • -

    Mumbai Area, India

  • -

    Mumbai Area, India

Education

  • ICLES Motilal Jhunjhunwala College - India

    -

    -

Licenses & Certifications

Projects

  • 🚀 Building My Copilot-Powered Job Search Bot for LinkedIn 🚀

    -

    🚀 Building My Copilot-Powered Job Search Bot for LinkedIn 🚀
    As a Cloud Security Architect actively exploring remote opportunities across UK/US time zones, I’m developing a smart workflow that integrates Microsoft Copilot with LinkedIn to automate job discovery and applications. Here's the blueprint:
    🔍 Objective
    Automate job search and application for remote cloud security roles using Copilot as the intelligence layer.
    🧠 Copilot Input Layer
    Natural language queries…

    🚀 Building My Copilot-Powered Job Search Bot for LinkedIn 🚀
    As a Cloud Security Architect actively exploring remote opportunities across UK/US time zones, I’m developing a smart workflow that integrates Microsoft Copilot with LinkedIn to automate job discovery and applications. Here's the blueprint:
    🔍 Objective
    Automate job search and application for remote cloud security roles using Copilot as the intelligence layer.
    🧠 Copilot Input Layer
    Natural language queries like:
    “Find remote Defender jobs in UK”
    “Apply to roles with hybrid M365 deployments”
    Copilot filters by skills, location, and application preferences.
    🛠️ Job Search Engine
    • Option A: LinkedIn scraper via Playwright/Puppeteer
    • Option B: Parse LinkedIn job alerts via email/RSS
    Extract job title, company, location, description, Easy Apply status.
    📝 Copilot Intelligence Layer
    • Analyze job descriptions
    • Match with my skills (Defender, Exchange Online, SIEM, etc.)
    • Score relevance
    • Draft tailored cover letters, InMail messages, and form responses
    📤 Application Engine
    • Auto-fill Easy Apply forms
    • Upload resume
    • Submit or notify for manual review
    📊 Logging & Feedback
    Track jobs applied, date/time, and outcomes
    Improve matching and refine messaging over time
    🔐 Security & Ethics
    • Secure vaults for credentials
    • Respect LinkedIn’s automation policies
    • Manual approval option for high-value roles
    💡 Tech Stack
    Copilot + Playwright + Python + Azure Key Vault + MongoDB

  • Getting Started with KQL (Kusto Query Language)

    -

    Getting Started with KQL (Kusto Query Language)

    Here are some of the most widely used KQL queries for threat hunting and detection engineering:

    💥 Suspicious PowerShell Execution

    DeviceProcessEvents | where FileName == "powershell.exe" | where ProcessCommandLine has_any ("-nop", "-exec bypass", "-enc") | project Timestamp, DeviceName, AccountName, ProcessCommandLine

    🔐 Failed Logon Brute Force Detection

    SecurityEvent | where EventID == 4625 | summarize…

    Getting Started with KQL (Kusto Query Language)

    Here are some of the most widely used KQL queries for threat hunting and detection engineering:

    💥 Suspicious PowerShell Execution

    DeviceProcessEvents | where FileName == "powershell.exe" | where ProcessCommandLine has_any ("-nop", "-exec bypass", "-enc") | project Timestamp, DeviceName, AccountName, ProcessCommandLine

    🔐 Failed Logon Brute Force Detection

    SecurityEvent | where EventID == 4625 | summarize FailedLogons = count() by Account, bin(TimeGenerated, 1h) | where FailedLogons > 5

    🌍 Anomalous Azure AD Sign-Ins

    SigninLogs | where ResultType != 0 | where Location != "US" | project UserPrincipalName, Location, IPAddress, ResultType

    🧠 These queries help me detect obfuscated attacks, brute force attempts, and suspicious sign-ins across cloud and endpoint environments.

    If you're working with Microsoft Defender, Sentinel, or Azure Monitor—KQL is a must-have skill. Let’s connect if you’re building detection rules, automating threat response, or just exploring the language.

    #KQL #MicrosoftSentinel #DefenderForEndpoint #ThreatHunting #CloudSecurity #SIEM #SOC #DetectionEngineering #PowerShell #AzureSecurity #CyberSecurity #Microsoft365 #SecurityOps

More activity by Robin Poulose

View Robin Poulose’s full profile

  • See who you know in common
  • Get introduced
  • Contact Robin Poulose directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses