cyber security specialist
confidential
Total years of experience :5 years, 8 Months
Investigate alerts correlated by LogRhythm SIEM Solution from multiple log sources.
Commence scans using different IOCS by utilizing tools such as YARA and Thor Scanner.
Perform the incident response process and draft incident reports. Raise recommendations for resolving and remediating security incidents.
Guide and collaborate with the team to apply best practices in performing security investigation.
Validate web applicati monitoring.
Enhance detection catalogue by suggesting Use-cases that aligns with MITRE ATT&CK.
security visibility requirements nsure sufficient Review currently implemented Use-cases and advise on methods of tuning. Participate in Threat Hunting exercises using security tools like SIEM, EDR, Sandbox, email gateway and threat intelligence tools.
Investigate alerts correlated by Splunk SIEM Solution from multiple log sources.
Examine and resolve false positive alerts, escalate true positives to team leader,
Commence scans using different IOCS by utilizing tools such as YARA and Thor Scanner.
Perform the incident response process and draft incident reports. Raise recommendations for resolving and remediating security incidents.
Guide and collaborate with the team to apply best practices in performing security investigation.
Validate web application security visibility requirements to ensure sufficient monitoring.
Monitoring, troubleshooting and optimizing for CS, PS, IMS & IN KPIs by using multi tools such as (U2000, Across PM Smart care and Astellia).
Computer engineer