Uses data collected from a variety of cyber defense tools (e.g., IDS, alerts, firewalls, network traffic logs) to analyze events (forensics) that occur within their environments for the purposes of mitigating threats.
Develops unique cyber indicators to maintain constant awareness of the status of the highly dynamic operating environment.
Collects, processes, analyzes, and disseminates cyber warning assessments.
Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities.
Leverages all authorized resources and analytic techniques to penetrate targeted networks.
Able to identify quickly vulnerabilities and security incident from data
Able to maintain RTDP in security condition collaborating with build & run teams
Create a confidence climate for our RTDP clients
Handle intrusion detection methods and IS corruption
Nous utilisons des cookies pour vous garantir la meilleure expérience sur notre site web. Si vous continuez à utiliser ce site, nous supposerons que vous en êtes satisfait.J'acceptePolitique de confidentialité