March 3, 2023, 1:19 p.m. | Ali AK

System Weakness - Medium systemweakness.com

Scenario: Compromise has been confirmed within the Best Festival Company Infrastructure, and tests have been conducted in the last couple of weeks. However, Santa’s SOC team wonders if there are methodologies that would help them perform threat detection faster by analysing the logs they collect. Elf McSkidy is aware of Sigma rules and has tasked you to learn more and experiment with threat detection rules.

Day 18 Learning Objectives: Threat Detection using Sigma

Threat Detection

Threat detection involves proactively pursuing …

aware collect compromise ctf cyber cybersecurity detection detection rules elf festival infrastructure learn logs rules scenario siem sigma sigma rules soc team tests threat threat detection threat intelligence tryhackme

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)