I need someone to crack interview on my behalf and need support on job
- or -
Post a project like this$$
- Posted:
- Proposals: 1
- Remote
- #1536180
- Expired
Description
Experience Level: Intermediate
Enterprise Intrusion Detection / Prevention & Network / Host-Based Malware Analysis engines
FireEye, Mandiant, Bluecoat, IBM,ISS, RSA, McAfee, Cisco/SourceFire, Checkpoint IPS, HP Tipping Point.
Review security incidents; determine their severity and impact
Demonstrated understanding of the
• Life cycle of network threats,
• Network attacks,
• Attack vectors and
• Methods of exploitation with an understanding
• of intrusion set tactics, techniques and procedures (TTPs).
Forensic analysis; analysis of compromised machines and analysis of
network traffic and log data.
• Create/Modify/Tune YARA rules,
• malware reverse engineering,
• threat modeling, etc.
Drive process creation and improvement and develop internal Tactics,
Techniques, and Procedures (TTPs) for analysis, establishing reporting
criteria, structure, and operational reports
Experience with and knowledge of
• internet/intranet networking protocols and services,
• TCP/IP, Routing Protocols,
• OSI model,
• defense-in-depth and common security elements
Have knowledge on analyzing packet captures,
• tcpdump,
• Wireshark.
Identify security incidents through log investigation, correlation and
analysis with SIEM Solutions like
• ArcSight,
• Splunk,
• Qradar,
• AlienVault,
• McAfee SIEM, etc.
Report and investigate on anomalies outside the expected norm
Incident reporting and Analysis
Linux command line experience
Troubleshoot and Resolve network/operating system security issues
Ability to perform and interpret vulnerability assessments
Ability to administer the operations of a security infrastructure
Experience in cyber intelligence analysis
FireEye, Mandiant, Bluecoat, IBM,ISS, RSA, McAfee, Cisco/SourceFire, Checkpoint IPS, HP Tipping Point.
Review security incidents; determine their severity and impact
Demonstrated understanding of the
• Life cycle of network threats,
• Network attacks,
• Attack vectors and
• Methods of exploitation with an understanding
• of intrusion set tactics, techniques and procedures (TTPs).
Forensic analysis; analysis of compromised machines and analysis of
network traffic and log data.
• Create/Modify/Tune YARA rules,
• malware reverse engineering,
• threat modeling, etc.
Drive process creation and improvement and develop internal Tactics,
Techniques, and Procedures (TTPs) for analysis, establishing reporting
criteria, structure, and operational reports
Experience with and knowledge of
• internet/intranet networking protocols and services,
• TCP/IP, Routing Protocols,
• OSI model,
• defense-in-depth and common security elements
Have knowledge on analyzing packet captures,
• tcpdump,
• Wireshark.
Identify security incidents through log investigation, correlation and
analysis with SIEM Solutions like
• ArcSight,
• Splunk,
• Qradar,
• AlienVault,
• McAfee SIEM, etc.
Report and investigate on anomalies outside the expected norm
Incident reporting and Analysis
Linux command line experience
Troubleshoot and Resolve network/operating system security issues
Ability to perform and interpret vulnerability assessments
Ability to administer the operations of a security infrastructure
Experience in cyber intelligence analysis
Manoj K.
0% (0)Projects Completed
-
Freelancers worked with
-
Projects awarded
0%
Last project
18 Apr 2024
United Kingdom
New Proposal
Login to your account and send a proposal now to get this project.
Log inClarification Board Ask a Question
-
There are no clarification messages.
We collect cookies to enable the proper functioning and security of our website, and to enhance your experience. By clicking on 'Accept All Cookies', you consent to the use of these cookies. You can change your 'Cookies Settings' at any time. For more information, please read ourCookie Policy
Cookie Settings
Accept All Cookies