Join team Boeing! 🤝 ✈ The Boeing Test & Evaluation (BT&E) organization is seeking a Product Security Pentester to support cyber test capability. The selected applicant will join a highly technical Enterprise Test & Evaluation team building an offensive cyber test capability in Berkeley, MO. This position will be providing testing services to Boeing Defense Space & Security (BDS) portfolio. The primary responsibilities will include Product Security (Cyber) test planning, integration, and execution, mission-based risk assessments, vulnerability assessments, and penetration tests. The selected candidate will become a St. Louis area team member trained across the broader BT&E enterprise Product Security Capability team with the opportunity to also contribute to innovation efforts advancing adversarial testing. If you are interested in this position, please follow the link below to apply! https://lnkd.in/gCw23WC8
Elizabeth Porter’s Post
More Relevant Posts
-
Cybersecurity Analyst | Experienced Penetration Tester | SOC Analyst | HTB CTF Challenger 🛡️ My Personal blog : medium.com/@rebaleos0
After several enriching months immersed in an extraordinary educational journey, I find myself standing at the apex of the distinguished SOC Analyst path on Hack The Box Academy. Expressing the profound depth of this experience and the significant value it has added to my skill set is a challenge in itself. What sets this path apart is its unwavering focus on practical training. Unlike conventional courses, Hack The Box recognizes that cybersecurity, whether on the Red Team or the Blue Team, necessitates hands-on experience in diverse scenarios within a realistic and practical environment. Each piece of information was seamlessly complemented by labs, exercises, and challenges, compelling me to adopt the mindset of a genuine security analyst and confront scenarios mirroring the intricacies of the real world. The path spanned a comprehensive array of topics, endowing me with tangible skills in security monitoring, incident response, threat hunting, network traffic analysis, IDS/IPS, malware analysis, digital forensics, and incident reporting. The content delved into the nuances of Network Traffic analysis using tools like WireShark, engaging in network attacks, traversing through SIEM solutions like Splunk and ELK with a specific focus on Detecting Windows Attacks with Splunk, and mastering the use of tools such as sigma and yara based on TTPs (Mitre ATT&CK framework). The journey was nothing short of extraordinary, involving a profound exploration of dynamic and static analysis methods for malware, addressing challenges posed by Zeek and Snort, hunting threats through the Event Viewer, comprehending the significance of Windows Events, and navigating the intricacies of DFIR investigations. It all culminated in the invaluable skill of crafting effective incident response reports. The effort invested in this course is truly commendable. The challenges presented by Hack The Box compelled us to train on the most critical tools in today's Security Operations Center (SOC), urging us to think outside the box and approach problem-solving with creativity. I am sincerely grateful for the profound depth of knowledge I've acquired. Hats off to the Hack The Box Academy team! I am thrilled at the prospect of undertaking the exam and earning the HTB CERTIFIED DEFENSIVE SECURITY ANALYST certification—a certificate that cannot be obtained without completing the entire SOC Analyst path. This speaks volumes about their dedication to ensuring genuine learning through effort and practical application, transcending the mere acquisition of a certificate. Although time constraints currently hinder my ability to take the exam, I am eager to make it a priority in the near future. #HackTheBoxAcademy #HTBCertification #DigitalForensics #IncidentResponse #DFIR #ThreatHunting #HackTheBox #BlueTeam #CertifiedSecurityAnalyst #SOCAnalyst #CybersecurityTraining
Completed SOC Analyst
academy.hackthebox.com
To view or add a comment, sign in
-
Aspiring Cyber Security Professional | CompTIA Security + | BTL1 | CDSA HTB | CCNA in Progress | CTF Player |
45 days of constant aggression and Learning! 🎉 Happy to announce that I've completed the SOC Analyst path by HackTheBox - Dr. AITH ! 🚀 🔍 Throughout this journey, I've honed my skills in Incident Handling, Security Monitoring & SIEM Fundamentals, Windows Event Logs Analysis, Threat Hunting with Elastic, Investigating with Splunk, Windows Attacks & Defense, Network Traffic Analysis, Malware Analysis, YARA & Sigma Rules creation, Digital Forensics, and more. 💼 Security Incident handling, Threat Hunting, Malware Analysis, and Digital Forensics are now my forte, empowering me to better protect organizations against evolving cyber threats. Check it here - https://lnkd.in/gM-HyxZn #CyberSecurity #SOCAnalyst #Hackthebox #IncidentHandling #ThreatHunting #MalwareAnalysis #DigitalForensics
Completed SOC Analyst
academy.hackthebox.com
To view or add a comment, sign in
-
🎓 SOC Analyst Path Completed 🛠️ SOC Processes & Methodologies: Strengthened foundational SOC principles. 📊 SIEM Operations (ELK/Splunk) & Tactical Analytics: Mastered SIEM tools and tactical data analytics. 📜 Log Analysis: Refined my log analysis capabilities. 🕵️♂️ Threat Hunting: Developed proactive threat hunting strategies. 🔒 Active Directory Attack Analysis: Learned to analyze and mitigate AD attacks. 🌐 Network Traffic Analysis (incl. IDS/IPS): Enhanced skills in monitoring and analyzing network traffic. 🦠 Malware Analysis: Advanced my understanding of malware behavior and analysis. 🚨 DFIR Operations: Gained knowledge in Digital Forensics and Incident Response. #SOCAnalyst #CyberSecurity #HackTheBox #SIEM #ThreatHunting #MalwareAnalysis #DFIR
Completed SOC Analyst
academy.hackthebox.com
To view or add a comment, sign in
-
I have just completed the SOC Analyst Path offered by Hack The Box! What were the key takeaways from this path? ✅ SOC Processes & Methodologies ✅ SIEM Operations (ELK/Splunk) & Tactical Analytics ✅ Log Analysis ✅ Threat Hunting ✅ Active Directory Attack Analysis ✅Network Traffic Analysis (incl. IDS/IPS) ✅ Malware Analysis ✅ DFIR Operations #learning #hackthebox #cyber #security
Completed SOC Analyst
academy.hackthebox.com
To view or add a comment, sign in
-
Sr. Information Security Engineer at FIS Global | Endpoint Security, EDR/XDR, DLP, CASB | SC-200 | CCNA
𝟐𝟎𝟎 𝐈𝐓 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐉𝐨𝐛 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬 Below is a list of interview questions categorized by different cybersecurity job roles intended to reveal a candidate’s strengths and most glaring weaknesses. Categories include: • General IT Security Administration • Network Security • Application Security • Security Architect • Risk Management • Security Audit, Testing and Incident Response • Cryptography The questions evaluate a broad range of candidates’ technical skills, understanding of cybersecurity terminology and technology as well as their ability to think and solve problems. #cybersecurity #interviewquestions
To view or add a comment, sign in
-
"🔍💻 Join our Cyber Defense Team! Are you passionate about unraveling digital mysteries and safeguarding against cyber threats? We're hiring a Incident Response & Digital Forensics Specialist (someone with strong IR & Investigation Skills with basic/mid level knowledge of Forensics) to lead investigations and fortify our defenses. Apply now and be at the forefront of cybersecurity innovation! #CyberSecurity #DigitalForensics #IncidentResponse #JoinOurTeam"
Security Incident Response Job | Navi Mumbai | Mid-Level
expertia.ai
To view or add a comment, sign in
-
Field Technician | Aspiring Cybersecurity Analyst | BS Information Networking and Telecommunications (Cybersecurity)
Excited to announce that I've just completed the SOC Analyst path on HackTheBox! Here's a breakdown of the modules I completed for the pathway: - Incident Handling Process - Security Monitoring & SIEM Fundamentals - Windows Event Logs & Finding Evil - Introduction to Threat Hunting & Hunting With Elastic - Understanding Log Sources & Investigating with Splunk - Windows Attacks & Defense - Intro to Network Traffic Analysis - Intermediate Network Traffic Analysis - Working with IDS/IPS - Introduction to Malware Analysis - JavaScript Deobfuscation - YARA & Sigma for SOC Analysts lete - Introduction to Digital Forensics - Detecting Windows Attacks with Splunk - Security Incident Reporting If there are any other noteworthy programs that I should enroll in let me know! #SOCAnalyst #Cybersecurity #HackTheBox
Completed SOC Analyst
academy.hackthebox.com
To view or add a comment, sign in
-
🔐 What Makes You a Good SOC Analyst? 🚀 🛠️ Technical Expertise: Understanding of Cybersecurity Fundamentals: A solid foundation in cybersecurity principles, including knowledge of network security, malware analysis, and threat intelligence, is essential. Proficiency with Tools: Familiarity with SIEM tools, endpoint detection and response (EDR) systems, firewalls, and other security technologies enables effective threat detection and response. Scripting and Automation: Skills in scripting languages (e.g., Python, PowerShell) help automate repetitive tasks and streamline incident response processes. 🔍 Analytical Skills: Threat Analysis: Ability to analyze and interpret security alerts, logs, and data to identify potential threats and understand their impact on the organization. Problem-Solving: Strong problem-solving skills to quickly identify the root cause of security incidents and implement effective solutions. Attention to Detail: Meticulous attention to detail to spot anomalies and patterns that could indicate security threats. 📚 Continuous Learning: Staying Updated: Keeping up with the latest cybersecurity trends, threat landscapes, and emerging technologies through continuous education and certifications (e.g., CEH, CISSP, CompTIA Security+). Adaptability: Ability to quickly learn and adapt to new tools, techniques, and procedures as the cybersecurity field evolves. 🌐 Communication Skills: Clear Reporting: Writing clear, concise incident reports and documentation that can be understood by both technical and non-technical stakeholders. Collaboration: Working effectively with other IT and security teams, sharing information, and coordinating responses to security incidents. Training and Awareness: Educating employees about security best practices and promoting a security-aware culture within the organization. 🔒 Critical Thinking and Decision-Making: Risk Assessment: Evaluating the potential impact of threats and deciding on the best course of action to mitigate risks. Prioritization: Ability to prioritize tasks and incidents based on their severity and potential impact on the organization. 🧩 Personal Qualities: Curiosity and Inquisitiveness: A natural curiosity to understand how systems work and how they can be exploited, paired with a relentless drive to investigate and uncover threats. Resilience and Stress Management: Remaining calm and effective under pressure, especially during high-stakes security incidents. 🌐 Team Player: Collaboration: Working well within a team environment, sharing knowledge, and supporting colleagues in incident response efforts. Mentorship: Helping to mentor and guide junior analysts, fostering a supportive and knowledgeable SOC team. #SOCAnalyst #CyberSecurity #TechnicalSkills #ThreatDetection #IncidentResponse #AnalyticalSkills #ContinuousLearning #CommunicationSkills #CriticalThinking #TeamPlayer
To view or add a comment, sign in
-
-
I've successfully completed the SOC Analyst Path at Hack The Box Academy! This course equip me with an in-depth understanding of Security Monitoring, Incident Handling, Threat Hunting, and Digital Forensics within the context of enterprise-level infrastructure. Incident Handling Process Security Monitoring & SIEM Fundamentals Introduction to Threat Hunting & Hunting With Elastic Windows Event Logs & Finding Evil Understanding Log Sources & Investigating with Splunk Windows Attacks & Defense Intro to Network Traffic Analysis Intermediate Network Traffic Analysis Working with IDS/IPS Introduction to Malware Analysis JavaScript Deobfuscation YARA & Sigma for SOC Analysts Introduction to Digital Forensics Detecting Windows Attacks with Splunk Security Incident Reporting
Completed SOC Analyst
academy.hackthebox.com
To view or add a comment, sign in
-
I've met a number of individuals recently who are attempting to migrate from a SOC tier 1, tier 2 analyst position to detection engineering. It can be difficult to get hired into one of these roles without already having experience. Below are some suggestions for moving from a SOC analyst to an entry level detection engineer. 1. Read the top ten articles or blogs on cyber security or detection engineering and know how to speak about the concepts they discuss confidently. There's a number of top ten lists which all point to similar material. After reading these articles, at a minimum you should be able to: a) Know what the Pyramid of Pain is and the difference between an atomic IOC and a behavioral/procedural detection b) Know what the Cyber Kill Chain is and how it applies to intelligence driven defense. c) Know what MITRE ATT&CK is and how to leverage the information on its website If you want a quick primer on some of this, read my article in Medium on Detection Engineering Paradigms 2. Setup your own lab on your computer or in the cloud a) Setup a victim virtual machine b) Setup a trial/open-source version of a SIEM or EDR to monitor your victim VM c) Download and use an attack simulation tool such as Atomic Red or Caldera to simulate an attack on your victim VM 3. Learn how events are generated and what types of events are useful for detecting certain types of techniques (hint: the MITRE ATT&CK documentation provides a great place to start). a) Generate some of these events, see what they look like 4. Build a sample detection based upon a blog (or book) i.e. follow a step-by-step example 5. Build some new detections a) Identify an open-source intelligence blog/tweet etc. that you can write a detection for. b) Create the detection, test it, and document it (spend the time to make this a good detection, quality over quantity) c) Submit your detection to an open-source repository like Sigma d) Add references to these detections in your resume e) Repeat If you are looking for a more detailed guide, check out the book Megan Roddie, Jason Deyalsingh and I wrote on Detection Engineering. https://lnkd.in/ej2GZ7sv https://atomicredteam.io/ https://caldera.mitre.org/ https://github.com/SigmaHQ https://packt.link/GaryJ
To view or add a comment, sign in