[SK] Portfolio / Selected Work / SecureShield
PROJECT_003 // 2022–23
Cybersecurity · Enterprise

Reimagining Cybersecurity
Through Human-Centered Design

MY ROLELead Designer
INDUSTRYCybersecurity / Enterprise
TIMELINE2022–23
TYPEWeb Application
SecureShield — Cybersecurity Platform Redesign
My RoleLead Designer
Timeline2022–23
PlatformWeb · Enterprise SaaS
StatusShipped · 2023
01

The Problem

Security teams struggled with threat identification and response due to fragmented dashboards, high alert noise, and poor visibility into risk context. Existing tools were technically powerful but cognitively overwhelming — resulting in delayed responses, missed threats, and analyst fatigue.

The platform served three distinct user roles — Security Analysts, Security Managers, and MSSP Partners — each with unique needs around speed, visibility, and control. A one-size-fits-all dashboard approach had failed all three. The redesign needed to serve each role without fragmenting the product.

"Technically powerful but cognitively overwhelming — analysts were drowning in alerts, not acting on threats."
— Design Brief

Who actually uses this tool?

Before evaluating any interface decision, I first ask myself one question: who is sitting at this screen, and what are they trying to accomplish in the next 60 seconds?

While working on this tool, I recognised that the product serves at least three distinct user roles, yet the existing interface seemed designed primarily for administrators rather than the analysts who use it most intensively.

🔍
Security Analyst
  1. 01 See what's new and critical — immediately
  2. 02 Drill into a threat without losing context
  3. 03 Understand severity without doing mental maths
📊
Security Manager
  1. 01 Portfolio-level risk at a glance
  2. 02 Progress over time, not just current state
  3. 03 Exportable data for board reporting
🏢
MSSP Partner
  1. 01 Fast org switching with status context
  2. 02 Subscription and billing visibility
  3. 03 Delegated access management
02

Research Process

To understand how security analysts and managers actually worked under pressure, I conducted behavioral research that went beyond surface usability — observing live sessions and mapping full investigation journeys.

03

Key Insights

Research revealed that the core problem wasn't data availability — it was decision clarity. Analysts needed to act faster, not see more.

01
Alert Volume Overwhelms Prioritization

Analysts handle extremely high alert volumes daily. Prioritization matters far more than additional data visibility — more alerts without context creates more noise, not more clarity.

🔔 Signal over noise
02
Threats Are Perceived as Narratives

Analysts naturally perceive threats as progressive stories — attack origin → evolution → system impact. Dashboards that ignored this narrative flow broke investigation momentum.

🔍 Context-driven investigation
03
Trust in Automation Requires Explanation

Trust in automated threat scoring improves dramatically when users understand the reasoning and evidence behind system decisions. Black-box scores were routinely dismissed.

⚡ Explainable AI decisions
High
alert volumes handled daily — prioritization is the #1 analyst need
5+
tools switched per investigation, causing context loss and fatigue
40%
of critical threats delayed due to alert noise and dashboard overload
faster threat response when investigation context is preserved in one view
04

Design Strategy

01
Confidence-Driven Decision Making

Layered decision cues including risk indicators, evidence visibility, and impact previews to reduce uncertainty-driven hesitation. Analysts act when they understand, not just when they see.

02
Non-Linear Investigation Workflows

Progressive depth and flexible exploration enabling users to maintain context across investigative paths without losing their place or starting over.

03
Cognitive Load Reduction

Intelligent information structuring through signal clustering, minimised context switching, and actionable insight emphasis — putting the most critical information first.

05

Wireframes

Early wireframes establishing the core information hierarchy — from the login experience through the main threat dashboard and multi-organisation management view.

Wireframe 01 — Login
Wireframe 02 — Dashboard
Wireframe 03 — Organizations
Fig. 01 — Wireframes: Login · Threat Dashboard · Organisation Management
06

Key Screens

High-fidelity screens from the redesigned SecureShield platform — showing the refined threat visibility, contextual investigation flow, and role-adapted dashboard experience.

Key Screen 01
Key Screen 02
Key Screen 03
Fig. 02 — Key screens: Threat Dashboard · Investigation View · Organisation Management
07

Outcomes & Impact

32% ↑ Platform Adoption
40% ↓ Alert Noise Reduced
↑ Faster Threat Response
5+ ↓ Tools Per Investigation

By shifting focus from alert monitoring to decision acceleration, the redesign enabled faster analyst action, improved system intelligence trust, and enhanced risk management effectiveness in complex enterprise environments. SecureShield became a platform analysts actively wanted to use.