Cyber Security Self Introduction

 Self introduction:

Myself (Yourname) Currently working in (Your company name) as a 

security analyst from the last (Your Experience)

In this organization I am handling the roles and responsibilities like Incidents monitoring and analyzing part by using the siem tools like Microsoft sentinel, Ibm qradar, Micro Focus Arcsight, DLP tool forcepoint, Microsoft EDR

After analyzing the incidents we raise tickets in the ticketing tool for the appropriate team to remediate. 

Maintaining the incident tracker, and daily report. 

As well as participating in daily and weekly calls with vendors.

Reporting the siem health checkup. 

SIEM Analyst for log & event analysis, incident investigation, reporting, remediation and also develop


• Worked on Multiple SIEM tools like QRadar, sentinel, Archsight Was Responsible for complete detailed analysis in SIEM tools to provide the clear picture of incident to the customer.


Having an experience in creating Security Threat advisory for the latest cyber-attacks and providing all the IOC's(Indicators of compromise) if exists to make sure the client is safe from the ongoing global threats.

Capable of performing threat research from and collecting IOC’s and attack vectors on various intelligence sources.

• Create customized Daily/Weekly/Monthly reports and share with the relevant stakeholders.


Responsible for analyzing ￾firewall, IDS and Proxy logs to detect any possible attack such as SQL injection, Port scanning etc.

Responsible for proactively alerting the customer for tracking of any malicious activity observed on the customer network by monitoring Network/Endpoint devices.

Having experience in performing various Administration tasks like: adding log sources, configuring various threat intelligence applications to SIEM, Troubleshooting, defining user roles, adding new users, SIEM health check-up, license management.

• Responsible for handling security incidents escalated from L1 Analysts.

Run root cause analysis and post incident reviews working with the client to identify and plan improvements.

Able to Collect, Consume and Analyses data from the various Cyber Threat Intelligence Sources like Virus total, Cisco Talos which helps in providing the information about the incidents in much larger,wider and clearer way


Comments

Popular posts from this blog

Brute force attack investigation

Which tools and software do we need?

Packet drafting for IDS_IPS