May 23, 2023, midnight |

The GreyNoise Blog www.greynoise.io

Threat hunters spend a significant portion of their time searching through security logs looking for specific Indicators of Compromise (IoCs) or patterns of activity/behavior that indicate compromise.

and response compromise detection detection and response hunters indicators indicators of compromise iocs logs patterns response security threat threat detection threat detection and response

Assistant Manager, IT Security

@ CIMB | Cambodia

IT Security Engineer - GRC

@ Xtremax | Bandung City, West Java, Indonesia

Senior Engineer - Application Security

@ ANZ Banking Group Limited | Quezon City, PH

Penetration Tester Manager

@ RSM | USA-IL-Chicago-30 South Wacker Drive, Suite 3300

Offensive Security Engineer, Device Wireless Connectivity

@ Google | Amsterdam, Netherlands

IT Security Analyst I

@ Mitsubishi Heavy Industries | Houston, TX, US, 77046