Dedicated SOC/CSIRT Analyst with extensive expertise in cybersecurity operations and incident response. Proficient in utilizing a wide range of technologies, including SIEM , EDR, and various threat intelligence platforms. Demonstrated ability to analyze and mitigate security incidents, conduct forensic investigations, and implement robust security measures. Adept at collaborating with cross-functional teams to enhance security posture and ensure compliance with industry standards. Open to new opportunities to leverage skills and contribute to the protection of organizational assets
• Perform daily monitoring of security events/alerts, generated on the SIEM.
• Investigating EDR alerts and conducting investigations via EDR.
• Proposing and developing new use cases (Detection scenarios).
• Analyzing phishing emails and creating Yara rules to block them on the sandbox.
• Reporting and monthly security bulletins presentation.
• Onboarding of new entities.
• Investigating NDR alerts.
• Log collection optimization and review
• Report security incidents using ServiceNow ticketing system.
• Investigating DDOS attacks targeting web sites and internet published services.
• Finetunning and ameliorating old detection rules
Engineering and maintenance of the OCS (Online Charging System).
Internship under the theme: implementation of the SIEM (Siemonster), benchmark of (ossim, siemonster, elastick stack) and functional enrichment of the SIEM ELASTIC STACK Solution for the management of Cyber Security Events and Incidents.