Networks catch threats at Day 0 — before an attack reaches the endpoint. But OpenText had no coherent design story for network detection. I led research, strategy, and design to combine User & Entity Behavior Analytics (UEBA) with Network Detection and Response (NDR) — repositioning the portfolio around analyst efficiency and multi-variable intelligence.
Role: Principal Product Designer — research, competitive strategy, design direction, and cross-functional influence across ML Engineering, Product, and Go-to-Market.
EDR protects endpoints — but networks catch anomalies at Day 0, across North-South and East-West traffic, before an attack reaches a single device. OpenText had the ML models and SIEM integrations. What it lacked was a design that made that intelligence usable.
The competitive angle: ExtraHop and Vertica AI used single-variable anomaly detection — one signal at a time. OpenText's Intersect Models could correlate multiple variables simultaneously: login time + location + data access + privilege level. That was the differentiator. The design challenge was making it feel simple, not complex — and doing it within the median analyst triage window of 15 minutes.
20 interviews with SOC analysts and threat hunters. Competitive analysis across ExtraHop, Vertica AI, Microsoft Azure, CrowdStrike, and Wiz. The findings converged around four problems that no competitor had solved.
Traditional IDS and dashboards require prior domain knowledge and struggle with evolving threats. Anomalies at the network layer — especially behavioral ones — were going completely undetected.
Analysts needed simpler, faster mechanisms to work through traffic alerts. The existing UI required domain expertise just to read the data — let alone act on it within 15 minutes.
There was no prioritized view. Analysts had to manually sort through all anomalies. The most severe threats didn't surface first, and context was missing for quick decisions.
Every network is different. Analysts needed to set exceptions and adjust thresholds based on their specific environment — but no tool gave them that control without ML expertise.
"By the time I've opened three tabs to correlate a single alert, my 15 minutes are already gone. I need the context in the row — not behind a click."— SOC Analyst, Level 2 · Research interview, 2024
Competitive Context
User Journey Map
The core tension: SOC analysts needed speed (15-minute triage windows), while threat hunters needed depth (24-hour investigation cycles). A single interface could serve neither well. This insight drove the entire dual-interface strategy.
Research surfaced a clear primary user — not a helpdesk generalist, but a trained analyst handling 40–80 alerts per shift, correlating behavioral signals with network data, and making escalation decisions under real time pressure.
Secondary user — Threat Hunter (SOC Level 3): proactively hunts using historical behavior trends, multi-variable correlation, and custom anomaly thresholds. Needs depth and query power — not the same interface as Marcus. This tension between speed and depth drove the dual-interface design strategy.
Before touching hi-fi, I sketched the interaction model for the rules builder — the most novel UI challenge. How do you make rule creation approachable for a non-ML user without hiding the power a threat hunter needs?
The key lo-fi decision: rules as visual objects, not code. Conditions rendered as connected blocks rather than script syntax — bringing the builder within reach of analysts who understand logic but not ML. This became the foundational pattern for all subsequent security rules UIs at OpenText.
The hi-fi anomalies dashboard was designed around one constraint: every piece of information an analyst needs to make a triage decision must be visible in the alert row — no clicking, no expanding, no hunting.
The design decision that changed the architecture: MITRE ATT&CK classification had to appear in the list row, not behind a detail click. This required ML engineering to surface classification data in the alert payload — a design requirement reshaping the data contract.
When Elena investigates an anomaly, she needs correlation tools, historical context, and topology exploration. A completely different interaction model — depth over speed, breadth over brevity.
This prototype was one of my first explorations using Figma Make's AI prompting interface — describing interactions in natural language and watching them come to life instantly. It cut iteration time dramatically and sharpened how I think about prompting AI for design. Test alert triage workflows, build custom rules, and explore the topology investigation interface. No login required.
The final design brings both interfaces into a unified platform. From a single alert in the analyst dashboard, context flows seamlessly into the hunter workbench — two distinct experiences sharing one coherent data model.
"Don't compete on visual sophistication. Compete on analyst efficiency. Speed and clarity beat aesthetics every time."— Core positioning recommendation, presented to Product Leadership, Q3 2024
I'm happy to walk through the research findings, competitive positioning, or the design decisions that shaped the product architecture.