Cyber Security Delivery
As Cyber Security Consultant for FirstPort Property Management, I transformed their SOC from a reactive posture into an intelligence-led automation powerhouse, reducing manual triage by over 80%.
The Challenge
As the Cyber Security Consultant engaged by FirstPort Property Management, I was responsible for overhauling the organisation's reactive security posture mid-flight during a high-stakes Digital Transformation programme. The organisation had expanded its digital footprint rapidly — adopting new cloud services, new endpoints, and third-party integrations — without a corresponding evolution in its security controls. This culminated in a security ecosystem heavy on manual effort and light on visibility, at precisely the moment the attack surface was at its widest.
- No centralised visibility existed across the estate, meaning threats could move laterally without detection.
- Security operations were entirely manual: alert triage, incident response, and access reviews consumed critical analyst time that should have been proactively directed at strategic risk.
- Data governance was absent — sensitive property management data had no classification, protection policies, or monitoring for exfiltration.
- Identity controls relied on legacy perimeter thinking with no conditional access or risk-based authentication enforced.
- Shadow IT was unmonitored, with third-party cloud services used across the business with no central visibility or policy enforcement.
- The transformation programme itself created a moving target: new systems, integrations, and data flows introduced fresh risk faster than it could be manually assessed.
The Approach
I structured the engagement across four parallel workstreams designed to deliver immediate risk reduction while building the automated foundations necessary to sustain the security posture long-term.
Workstream 1 — Centralised Threat Detection (XDR / SIEM)
- I designed and deployed Microsoft Sentinel end-to-end, configuring data connectors, analytics rules, workbooks, and incident queues from scratch.
- I integrated the full Microsoft Defender XDR suite — Defender for Endpoint, Defender for Identity, and Defender for Cloud Apps — into a single correlated detection engine.
- I configured custom analytics rules to detect multi-stage attack patterns specific to the property management environment.
- I established a real-time threat hunting capability where none had previously existed.
Workstream 2 — SOAR & Automation (Logic Apps)
- I identified the highest-volume, lowest-complexity alert categories consuming analyst time and automated response workflows for each using Azure Logic Apps.
- I built automated playbooks for phishing triage and mailbox remediation, endpoint isolation on confirmed compromise signals, and automatic ticket creation and escalation routing.
- I documented every playbook with trigger conditions, decision logic, and failure handling to ensure frictionless operability post-handover.
Workstream 3 — Data Governance & Information Protection
- I deployed Microsoft Purview to establish a data lifecycle framework encompassing classification, retention, and protection policies built around specific data categories (e.g., tenancy records, financial datasets).
- I rolled out sensitivity labelling and Data Loss Prevention (DLP) policies across M365, automatically classifying documents at creation without requiring user action.
- I deployed Microsoft Cloud App Security (MCAS / Defender for Cloud Apps) to bring shadow IT into view, subsequently risk-rating third-party services and applying policy enforcement.
Workstream 4 — Identity & Zero Trust Foundations
- I designed and implemented a Conditional Access policy framework in Microsoft Entra ID, enforcing access decisions based on verified identity, device health, location, and real-time risk scores.
- I eliminated implicit trust from the access model — validating every access request against strict policy, regardless of network location.
- I embedded Zero Trust principles tightly into the transformation programme's design standards so that new systems inherited the policy framework by default.
Programme Metrics
| Metric | Baseline | At Handover | Delta |
|---|---|---|---|
| Centralised visibility across estate | None | Full (Microsoft Sentinel) | ✓ |
| Automated SOAR playbooks deployed | 0 | 8+ | +8 |
| Mean Time to Respond (MTTR) | Manual / hours | Automated / minutes | ~90% reduction |
| Sensitive data classifications | 0 | 100% of M365 estate | ✓ |
| Shadow IT apps discovered | 0 (unmonitored) | 25–50 apps assessed | ✓ |
| Conditional Access policies | 0 | Full estate coverage | ✓ |
| Manual Triage Labour | Est. 15–20 hrs / wk | Est. 2–4 hrs / wk | >80% reduction |
The Results
- I transformed the security operating model from reactive and manual to automated and intelligence-led — in a single 90-day engagement running tightly in parallel with an active digital transformation programme.
- I delivered full estate visibility through Microsoft Sentinel, giving the security team the unprecedented ability to detect, investigate, and respond to threats across identities, endpoints, cloud services, and data.
- I eliminated implicit trust from the access model by implementing Conditional Access frameworks based on real-time risk, not network locality.
- I handed over a fully documented, operationally sustainable security ecosystem where the internal team could govern, expand, and independently extend policies.
Business & Security Impact
- My automation workstream successfully recaptured 15–20 analyst hours per week, effectively redirecting half a full headcount from reactive clearing to proactive defence. This aligns with Forrester TEI industry benchmarks showing that Sentinel and SOAR capability deliveries typically unlock a 234% ROI, an 85% reduction in advanced investigation labor, and $1.5 million in SOC efficiency.
- By eliminating implicit trust and enforcing a strict Conditional Access perimeter via Microsoft Entra ID, I delivered a capability consistent with Forrester's Entra TEI benchmarks—which independently demonstrate a 131% ROI, a 30% reduction in identity-related risk exposure, and an 80% reduction in ongoing user management time.
- Future system onboarding inherited the stringent Zero Trust framework automatically, eliminating Security-by-Retrofit and preventing exposure at scale.
This outcome was made possible by my deep operational experience within the Microsoft Security stack and my ability to drive aggressive implementation timelines simultaneously. My hands-on leadership ensured that defensive architecture enhanced the speed of their digital transformation rather than acting as a blocker.