RAG, ICL, and Windows Events: Building a Human-Guided Security Analyst: https://jonny-johnson.medium.com/rag-icl-and-windows-events-building-a-human-guided-security-analyst-395faa6769a4
RAG, ICL, and Windows Events: Building a Human-Guided Security Analyst: https://jonny-johnson.medium.com/rag-icl-and-windows-events-building-a-human-guided-security-analyst-395faa6769a4
AI is becoming central to security operations. Let's talk about why. ๐
AI-assisted workflows are on the rise. โฌ๏ธ And, when an algorithm highlights a critical #security event, analysts need to understand why that happened. Without true visibility, this #AI assistance risks creating new blind spots and hiding important context, rather than leading to a solution. ๐
To make sense of the constant overflow of alerts, you need AI capabilities that are built into workflows that you already use, like:
โ๏ธ Behavioral detection
โ๏ธ Risk-based prioritization
โ๏ธ Investigation summaries
โ๏ธ Smarter dashboards and search
Learn how you can leverage these important AI capabilities and stay in control while using tools that accelerate detection, streamline investigations, and strengthen your reporting: https://graylog.org/post/how-graylog-uses-explainable-ai-to-help-security-teams/ #cybersecurity #securityops #security #securityanalyst
๐ Hey IT pros, security analysts, and sys admins! Have you taken advantage of #graylog's FREE analyst training, yet? The Graylog Academy is here for you. ๐ซต It's designed from the ground up by internal Grayloggers and experts, and anyone can sign up for it. ๐
This comprehensive on-demand training program covers a wide range of topics, ensuring participants gain a deep understanding of the platform and its capabilities. And for every test you pass you get a Graylog certificate! ๐
Learn about:
๐ Search fundamentals
๐ Graylog dashboards
๐ชต Log ingestion
๐ก Pipelines, parsing and the Graylog information model
๐๏ธ Dashboards and visualization
๐ Intro to API security
โ More!
Enroll here! โคต๏ธ
https://graylog.org/post/graylog-academy-free-training-available/
#ITPro #SysAdmin #securityanalyst #cybersecurity #security
Did you know that there is FREE online #Graylog analyst training? ๐ Take a look at Graylog Academy! Designed from the ground up by internal Grayloggers and expertsโanyone can sign up for Graylog Academy Training. ๐ฏ
Hereโs some of what you can learn about:
๐ Search Fundamentals
๐ Introduction to Graylog Dashboards
๐ชต Log Ingestion
โน๏ธ Pipelines, Parsing and Graylog Information Model
๐๏ธ Dashboards and Visualization
โ ๏ธ Events, Alerts and Notifications
๐ Intro to API Security
๐ Interactive Tours
Wondering if Graylog Academy is right for you? This training is ideal for:
โ๏ธ IT pros
โ๏ธ #Security analysts
โ๏ธ System administrators
โ๏ธ Anyone interested in learning about log management & analysis
Enroll here! โคต๏ธ
https://graylog.org/post/graylog-academy-free-training-available/ #ITpro #sysadmin #securityanalyst #cybersecurity
Over the past few years, #security analysts have worked together to combat threat actors by sharing information and strategies โ including the use of open source Sigma rules. ๐ค
Leveraging the capabilities of Sigma rules can help you optimize your centralized log management solution for security detection and response! ๐ก
Learn more about Sigma rules including:
โ Why you should use them
๐ Specific use cases
๐ฆด The anatomy of a Sigma rule
๐ Sigma rule event processing for advanced detection capabilities
https://graylog.org/post/the-ultimate-guide-to-sigma-rules/ #threatactors #cybersecurity #securityanalyst
๐ Have you checked out #Graylog Academy? We've got dashboards, pipelines & parsingโOH MY! So, if you're an #ITpro, #securityanalyst, #sysadmin or interested in learning about log management+analysisโthen this is for you. ๐ IT'S FREE.๐ Enroll now.๐
graylog.org/post/graylog... #cybersecurity #infosec
Graylog Academy: Free On-Deman...
Attn: Security Analysts... let's talk about what your Intrusion Detection System (IDS) and intrusion Prevention System (IPS) tools do, and how you can incorporate them into your network monitoring technology stack to improve network #security. ๐ช ๐ฅ๏ธ ๐
In our latest blog, Jeff Darrington talks about the differences between IDS and IPS, risk-based event triage for reducing alert fatigue, and much more.
https://graylog.org/post/do-you-need-ids-and-ips/ #cybersecurity #infosec #networksecurity #securityanalyst #alertfatigue
Compared to "regular" #ComputerScience, I kind of suspect that #CyberSecurity is one of the harder things to do.
I'd like to become a #securityanalyst, but learning low level languages, assembly included, as well as knowing all the ways to test, poke and prod #software, #hardware, #protocols, #api, all while trying to find vulnerabilities through the eye of a needle...
It just gets harder with every year and you'll have to know what the heck you're doing...
But it's well paid, I hear.
Job Alert
Security Analyst at Wipro - Bengaluru
Experience - 0-1 year
Mode - On-site, Full-Time
Job Alert
Security Analyst at Unisys - Bengaluru
Experience - 3-5 years
Mode - On-site, Full-Time
๐ We're thrilled to announce our triumph at the Globee Awardsยฎ! ๐ ๐
These awards highlight #Graylog's commitment to delivering a #security analyst experience that is not only top-notch but also remarkably user-friendly. ๐
๐ฅ Gold Globee Winner for Security Information and Event Management (#SIEM)
๐ฅ Gold Globee Winner for Threat Hunting, Detection, Intelligence, and Response
๐ฅ Silver Globee Winner for Application Programming Interface Management & Security
๐ฅ Bronze Globee Winner for Most Innovative Security Company of the Year โ Security Software
We are honored to be acknowledged with these Globee Awards for our pioneering approach and exceptional capabilities. Learn more. โคต
https://graylog.org/award/graylog-clinches-prestigious-globee-awards-in-cybersecurity-reinforcing-its-leadership-in-the-industry/ #securityanalyst #cybersecurity #APIsecurity
๐ช๐ต๐ฎ๐ ๐ถ๐ ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ผ๐ฝ๐ถ๐น๐ผ๐?
"It is a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders to improve security outcomes at machine speed and scale, while remaining compliant to responsible AI principles."
The primary focus of the Early Access Program is centered around:
๐๐๐ป๐ฐ๐ถ๐ฑ๐ฒ๐ป๐ ๐ฟ๐ฒ๐๐ฝ๐ผ๐ป๐๐ฒ
๐๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฝ๐ผ๐๐๐๐ฟ๐ฒ ๐บ๐ฎ๐ป๐ฎ๐ด๐ฒ๐บ๐ฒ๐ป๐
๐๐ฆ๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฟ๐ฒ๐ฝ๐ผ๐ฟ๐๐ถ๐ป๐ด
"Here's an explanation of how Microsoft Security Copilot works:
โก User prompts from security products are sent to Security Copilot.
โกSecurity Copilot then pre-processes the input prompt through an approach called grounding, which improves the specificity of the prompt, to help you get answers that are relevant and actionable to your prompt. Security Copilot accesses plugins for pre-processing, then sends the modified prompt to the language model.
โกSecurity Copilot takes the response from the language model and post-processes it. This post-processing includes accessing plugins to gain contextualized information.
โกSecurity Copilot returns the response, where the user can review and assess the response."
https://learn.microsoft.com/en-us/security-copilot/microsoft-security-copilot
#microsoft #microsoftsecurity #securitycopilot #copilot #soc #incidentresponse #soc #analyst #securityanalyst #ai #artificialinteligence #generativeai #openai #azureopenai #llm #cybersecurity #defender #xdr #sentinel #intune #prompt #largelanguagemodel #llm #foundationalmodel #gpt4 #gpt3
๐จ๐ป๐น๐ผ๐ฐ๐ธ๐ถ๐ป๐ด ๐๐ต๐ฒ ๐ฃ๐ผ๐๐ฒ๐ฟ ๐ผ๐ณ ๐๐๐ฏ๐ฒ๐ฟ ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐๐ป๐๐ฒ๐น๐น๐ถ๐ด๐ฒ๐ป๐ฐ๐ฒ ๐๐ถ๐๐ต ๐๐๐๐ฟ๐ฒ ๐ข๐ฝ๐ฒ๐ป๐๐ ๐ฎ๐ป๐ฑ ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ฒ๐ฟ ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐๐ป๐๐ฒ๐น๐น๐ถ๐ด๐ฒ๐ป๐ฐ๐ฒ
I'm excited to share my recent side project! ๐ปโจ
I've been exploring the incredible potential of a simple web app for engaging in conversations with threat intelligence data. In my case, I harnessed the power of Microsoft Defender Threat Intelligence.
All the details are in the following blog post:
I'd love to hear your thoughts and feedback.
This project has been an eye-opener for me, demonstrating how Generative AI can be a game-changer in the realm of cybersecurity. I hope it serves as a valuable starting point for other innovative applications in the cybersecurity space.
Let's connect and discuss how technology can empower us in the ever-evolving world of cybersecurity. ๐๐ก๏ธ
#azure #azureopenai #llm #chatbot #threatintelligence #ti #microsoft #microsoftdefenderthreatintelligence #mdti #cyber #cybersecurity #soc #threatactors #threatanalysis #ttp #ioc #securityanalyst #microsoftsecurity #largelanguagemodel #gpt4 #azurelogicapps #logicapps #cognitiveservices #dev #chat
Hey! Iโm looking to add another member to my growing security operations team! If you are looking to help grow security operation processes and work to find evil with an awesome team and a great business, take a look!
Imagine this. Youโre a #SecurityAnalyst protecting the Black Hat network when suddenly you notice Autoit.F, a trojan youโve never seen before. What do you do next? In a new blog, Ben Reardon explains how he was able to detect, investigate, triage, and close this exact incident using @corelightโs Open NDR Platform while serving in the NOC at #BlackHat. https://corelight.com/blog/blackhat-noc-usa-2023
๐๐ป๐๐ฒ๐ด๐ฟ๐ฎ๐๐ถ๐ป๐ด ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐ฏ๐ฒ๐ฑ ๐๐ฒ๐ณ๐ฒ๐ป๐ฑ๐ฒ๐ฟ ๐ถ๐ป๐๐ผ ๐๐ผ๐๐ฟ ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ผ๐ฝ๐ฒ๐ฟ๐ฎ๐๐ถ๐ผ๐ป๐
The deployment and implementation of the Microsoft 365 Defender platform will need careful planning with the SOC team to optimize the day-to-day operations and lifecycle management of the Microsoft 365 Defender service itself.
This content explores several concepts on how to operationalize and integrate Microsoft 365 Defender with either new or existing people, processes, and technologies that form the basis for modern security operations.
Use these steps to integrate Microsoft 365 Defender into your SOC.
1๏ธโฃPlan for Microsoft 365 Defender operations readiness
2๏ธโฃPerform a SOC integration readiness assessment using the Zero Trust Framework
3๏ธโฃPlan for Microsoft 365 Defender integration with your SOC catalog of services
4๏ธโฃDefine Microsoft 365 Defender roles, responsibilities, and oversight
5๏ธโฃDevelop and test use cases
6๏ธโฃIdentify SOC maintenance tasks
#m365defender #defender #microsoft #xdr #soc #zerotrust #azure #cloud #cloudsecurity #securityanalyst #mdo #mde #mdi #entraid #mdca
OSINT Toolkit is a full-stack web application designed to assist security analysts in their work: https://github.com/dev-lu/osint_toolkit
From zero to hero security coverage with Microsoft Sentinel for your critical SAP security signals.
"How the SOAR capabilities of Sentinel can be utilized in conjunction with SAP by leveraging Microsoft Sentinel Playbooks/Azure Logic Apps to automate remedial actions in SAP systems or SAP Business Technology Platform (BTP)"
#microsoft #azure #business #security #technology #sap #soar #sentinel #microsoftsentinel #siem #cloudnative #cloudsecurity #BusinessTechnologyPlatform #btp #erp #soc #detection #securityanalyst #playbook
From zero to hero security coverage with Microsoft Sentinel for your critical SAP security signals.
"How the SOAR capabilities of Sentinel can be utilized in conjunction with SAP by leveraging Microsoft Sentinel Playbooks/Azure Logic Apps to automate remedial actions in SAP systems or SAP Business Technology Platform (BTP)"
#microsoft #azure #business #security #technology #sap #soar #sentinel #microsoftsentinel #siem #cloudnative #cloudsecurity #BusinessTechnologyPlatform #btp #erp #soc #detection #securityanalyst #playbook
My Security team at #Plexure, in #Auckland, #NZ, is #hiring for a #SecurityAnalyst and #SecurityEngineer. We are a cloud-native organization that delivers APIs for some of the world's leading fast-food restaurants, and are looking for people with experience in #appsec, #compliance, #GDPR, and reviewing and improving security posture. #fedihire #hiring Security Analyst: https://plexure.breezy.hr/p/65e1bdf956b5-security-analyst?state=published
Security Engineer: https://plexure.breezy.hr/p/0229cfabdbaf-security-engineer?state=published