Security Analyst
- Integrating log source in SIEM, creating Use Case Rule in SIEM and finetuning rules.
- Performing threat hunts on SIEM solution as IBM Qradar and investigate through endpoint security solution such as Trellix HX
- Research and develop use case hypothesis for cyber threat hunt based on new attack vectors
- Hunting based on Open-Source Intelligence, MITRE ATT&CK framework and Threat Intel
- Creating threat hunting playbooks, providing recommendations to address vulnerabilities
- Documenting the findings and providing clear, actionable reports to relevant stakeholders.

