SEE US A FRIEND WE CARE
Ikem Michael Uche
Country Director Think Cyber | Senior Cyber Security Analyst | Certified Penetration Tester| SOC Analyst | Threat Hunter | Incident Response | API Sec Certified Expert
At Think Cyber what makes us different is paying attention to details and our ability to create an emotional bond with your cyber needs; it’s the fulcrum of our technology Innovation.
We are aware that there are so many vendors with varying solutions in the Cyber Sphere.
When it comes to details of meeting needs in the SOC department, we have taken time to pay attention to details that crop up in every day SOC activities.
As we all know 90% of cyber breaches are caused by Human Errors which find its root from
· Incompetence
· lack of hands on or inexperience
· Inability to build a failsafe process into SOC operation.
· Varying level of expertise in the team( Having a SOC team with individuals that are not equally skilled)
In warfare, everybody is trained to complement the other but the main focus is to destroy the enemy, secure the territory and ensure that no property or lives is lost or if lost with minimal damage. That is what Cyber Warfare is all about.
An advanced operational SOC consist of the following at the Basic
· Dedicated Engineers
· SOC Plumbers
· Intel Analyst (Tier 1 Analyst, Tier 2 Analyst, Tier 3 Analyst)
· Hunt Team
· Senior Escalation Support {CISO}
Dedicated Engineers
· This engineer's job is to build software that makes their security products talk to each other. This helps streamline their processes and automate data gathering as best as they can.
SOC Plumbers
· Monitor Basic detection capability of SIEM to advanced detection capability of Advanced SIEM
· Work with a combination of EDR and Network forensics to get advanced threat detection
Intel Analyst (Tier 1, Tier 2)
· Work mainly on SIEM,Tune correlation rules and plug some more specialized products into the SIEM.
· Ability to pull data from their network and endpoint security products without leaving the SIEM. This improves the quality (and speed) of their investigations.
· Escalate Incident to Tier Three Intelligent Analyst
Tier three analysts/Hunt Team
· Pick up escalation and pivot directly to more sophisticated analysis tools and consoles than SIEM
· Make sure that the intel feeding the technology is up to date,
· Ensure that the intel feeding it’s not burying shift analysts in useless alerts
· When serious threats arise – add color and context so that management understands the risks they’re facing.
· They focus exclusively on finding things their tech missed. While they do a little work in the SIEM, they spend most of their time building and running custom scripts to find threats their security products aren’t alerting on.
The CISO
· Make sure SOC operation is metrics-driven , watch closely what the ratios are between false positives and true positives, how long it takes to triage , investigate and how much value the organization is getting out of their security investments based on usage.
· Brings in third parties to run red team exercises to ensure the SOC is performing as expected, he reviews the metrics to ensure time-to-detect, time-to-respond and the overall accuracy that’s coming out of his SOC is improving. Monitors overall performance of the SOC.
At Think Cyber, our training covers all the tasks listed above in a single batch of training, because we perfectly understand the Cyber Security Customer Journey Map for our Clients.
From Basics- Defense-Offense-Hybrid –Customized we have fully taking into cognizance precision, accuracy and details that is why the training life cycle picks you from the scratch and turns you into a seasoned expert i.e
· Training Manual – Acquire the real fundament theoretical knowledge behind the subject matter
· Labs- Acquire skills, get accustomed to tools, practice and gain competence with the tools in each subject matter for problem solving
· 5 Real Life Scenario: Perform real life problem solving of previous Cyber attack, test your triage approach to solving problems, test your ability to react proactively and reactively to cyber attacks within your job description.
· Project: Use the whole knowledge you have acquired to develop a project of your own within the subject matter.
We are in the market to help companies like yours achieve value for every penny spent in the Cyber Department , as the header reads “ SEE US AS A FRIEND WE CARE”
Feel free to talk to us on how you can be part of our training starting from March 13th, which promises to be top notch quality training at pocket friendly budget.
While we look forward to hearing from you, always be assured of willingness to satisfy your cyber needs.
Yours sincerely,
Ikem Michael Uche
Country Director/Partner
Think Cyber Nigeria/Tech Hub Digital Solutions