Identified and designed the strategic response to a $300M market opportunity. While competitors like ExtraHop dominated network threat detection, OpenText lacked a coherent NDR story. I led research, product strategy, and design to launch a multi-variable anomaly detection platform that fundamentally repositioned our security portfolio—competing on analyst efficiency and threat hunter depth rather than visual polish.
Role: Principal Product Designer leading cross-functional strategy, user research, competitive analysis, and design direction. Influenced product roadmap, engineering architecture, and go-to-market positioning.
EDR solutions excel at endpoint detection. But networks are the vectors. ExtraHop, Vertica AI, and others were winning the NDR conversation by offering intelligent threat detection at network-scale. OpenText had no coherent story here.
The problem wasn't technical—it was organizational and strategic. Without a unified design vision for network detection, product teams were building fragments. Without understanding analyst workflows, we couldn't compete on usability. Without seeing that SOC analysts and threat hunters have fundamentally different needs, we'd design for neither.
In enterprise security, complexity isn't the enemy—opacity is. Network anomalies are inherently complex. But they're not unknowable. My thesis: make the invisible visible by designing for the patterns analysts already recognize (sudden spikes, unusual deviations, unexpected connections). Design for understanding, not for impressive visualizations.
The key insight: SOC analysts and threat hunters have opposing needs. Analysts need speed (15-minute triage). Hunters need depth (24-hour investigation). A single unified dashboard would optimize for neither.
I proposed a dual-interface strategy:
This decision reshaped the entire product architecture and influenced engineering to build modular alert pipelines. It became the design principle for all subsequent security platform work at OpenText.
The design was iterative and research-informed. Started with low-fidelity sketches exploring persona workflows, refined through Figma Make prototyping against competitive benchmarks, and validated against analyst feedback before final handoff to engineering.
Initial sketches exploring the rules builder UI—critical for letting analysts customize anomaly detection without requiring ML expertise. The challenge: make rule creation feel approachable, not overwhelming.
Four iterations exploring different interaction patterns: rule templates, visual condition builders, threshold sliders, and exception management.
Visual refinement of the analyst dashboard. The core insight: anomalies must be ranked by severity and context-rich from the first glance. No digging required for triage decisions. MITRE classification, risk scoring, and affected assets visible in the alert row itself.
Alert list showing severity-ranked anomalies with inline classification, risk scores, affected assets, and quick-action buttons. Designed for 15-minute triage cycles.
The investigation interface—designed for depth, not speed. When a threat hunter digs into an anomaly, they need correlation tools, historical context, topology exploration, and packet-level investigation. A completely different interaction model than the analyst triage dashboard.
Hunter investigation interface: timeline correlation, network topology with lateral movement paths, asset relationships, and forensic drill-down. Same data, completely different interaction pattern.
How an alert flows through the system from detection to resolution—showing the role of both interfaces and the handoff between analyst triage and hunter investigation.
The journey map visualizes how different personas interact with the system and the decision points that determine escalation from analyst triage to hunter investigation.
Rather than static screenshots, the full platform is interactive and clickable. Built entirely with Figma Make and AI prompts, this prototype demonstrates the complete analyst dashboard and threat hunter workbench in action. Click through alert triage workflows, build custom rules, and explore the topology investigation interface.
Open the interactive Figma Make prototype to explore the dual-interface design. Test alert triage flows, rules builder interactions, and hunter investigation workflows.
Open Interactive PrototypeBuilt with Figma Make + AI Prompts • Fully interactive flows • No login required
Analyzed 5 leading NDR competitors (ExtraHop, Vertica AI, Wiz, Orca, Defender XDR). The pattern was clear: everyone competed on visualization quality and feature breadth. But analyst feedback revealed the real pain: speed and clarity beat aesthetics. This insight shifted our entire competitive positioning.
Rather than compete on feature breadth or visualization sophistication, we compete on analyst efficiency and threat hunter capability:
Azure's NDR offers comprehensive network detection, but the interface reflects legacy Microsoft design patterns—information-dense, slow to parse, requires deep domain knowledge. Our approach prioritizes analyst decision speed with visual risk hierarchy and contextual summaries.
Azure Alert Management
OpenText NDR Analyst Dashboard
Key Difference: Azure requires analysts to navigate nested menus and dense tabular data. OpenText surface alert severity, MITRE classification, risk score, and affected assets in a single scannable view—enabling faster triage decisions.
The dual-interface approach wasn't a design detail—it was a strategic bet that differentiated the product and shaped engineering architecture. Principal design isn't about making things pretty; it's about making things that matter.
The 15-minute triage window wasn't a limitation—it was clarity. It eliminated unnecessary features, forced prioritization, and created a defendable competitive position. Constraints breed focus.
I didn't "convince" engineers to adopt the dual-interface architecture—I showed them why it mattered. Principal designers earn authority through research rigor and strategic thinking, not through seniority.
The lo-fi sketches, competitive analysis, and design iterations matter as much as the final design. They prove you didn't guess—you researched. That's what separates principals from executors.
Complete case study PDF with detailed design process, research findings, and artifact documentation coming soon.
The live demonstrations and design artifacts above showcase the strategic approach and execution. Interactive Figma prototype coming with final handoff documentation.
I'm always happy to discuss design process, security operations research, or how I approach complex dashboard design.