March 3, 2023, 1:19 p.m. | Ali AK

System Weakness - Medium systemweakness.com

Scenario: Compromise has been confirmed within the Best Festival Company Infrastructure, and tests have been conducted in the last couple of weeks. However, Santa’s SOC team wonders if there are methodologies that would help them perform threat detection faster by analysing the logs they collect. Elf McSkidy is aware of Sigma rules and has tasked you to learn more and experiment with threat detection rules.

Day 18 Learning Objectives: Threat Detection using Sigma

Threat Detection

Threat detection involves proactively pursuing …

aware collect compromise ctf cyber cybersecurity detection detection rules elf festival infrastructure learn logs rules scenario siem sigma sigma rules soc team tests threat threat detection threat intelligence tryhackme

Senior Associate, Cybersecurity Operations

@ Ares Management Corporation | Los Angeles, CA - CULVER CITY

Senior DevSecOps Engineer

@ Peraton | Fort Gordon, GA, United States

Senior DevSecOps Engineer

@ Diverto | Zagreb, Croatia

Lead DevSecOps Engineer

@ DTCC | Tampa, FL, United States

Incident Responder (Fraud Threat Management)

@ Scotiabank | Toronto, ON, CA, M5H1H1

Penetration Tester, Expert (Federal agency) - Tysons, VA - Full Time

@ iSoftTek Solutions | Tysons, Virginia, United States