Anomaly score vs. entity baseline
Named-entity recognition and graph context surface risky access spikes. You can show interviewers how anomaly scores stay explainable against learned baselines and alert thresholds.
Named-entity recognition (NER) pipeline that transforms unstructured access logs into actionable compliance artifacts and near-real-time alerts.
Named-entity recognition and graph context surface risky access spikes. You can show interviewers how anomaly scores stay explainable against learned baselines and alert thresholds.
Highlight precision, containment, and evidence rigor so hiring managers see how the NER + anomaly stack behaves in the real world.
From log ingestion through entity graphing and risk scoring, every stage is observable and locked behind your security baseline.
Identity and access insights are only valuable if the pipeline itself stays compliant.
EventBridge routes anomalies into Slack / Teams with just the evidence needed to accelerate approvals.
Exports package annotations, analyst decisions, and KMS audit logs into immutable S3 buckets.