#securityanalyst

2025-10-20

AI is becoming central to security operations. Let's talk about why. ๐Ÿ‘‡

AI-assisted workflows are on the rise. โฌ†๏ธ And, when an algorithm highlights a critical #security event, analysts need to understand why that happened. Without true visibility, this #AI assistance risks creating new blind spots and hiding important context, rather than leading to a solution. ๐Ÿ˜“

To make sense of the constant overflow of alerts, you need AI capabilities that are built into workflows that you already use, like:
โ˜‘๏ธ Behavioral detection
โ˜‘๏ธ Risk-based prioritization
โ˜‘๏ธ Investigation summaries
โ˜‘๏ธ Smarter dashboards and search

Learn how you can leverage these important AI capabilities and stay in control while using tools that accelerate detection, streamline investigations, and strengthen your reporting: graylog.org/post/how-graylog-u #cybersecurity #securityops #security #securityanalyst

2025-10-07

๐Ÿ‘‹ Hey IT pros, security analysts, and sys admins! Have you taken advantage of #graylog's FREE analyst training, yet? The Graylog Academy is here for you. ๐Ÿซต It's designed from the ground up by internal Grayloggers and experts, and anyone can sign up for it. ๐ŸŽ‰

This comprehensive on-demand training program covers a wide range of topics, ensuring participants gain a deep understanding of the platform and its capabilities. And for every test you pass you get a Graylog certificate! ๐ŸŒŸ

Learn about:
๐Ÿ” Search fundamentals
๐Ÿ“Š Graylog dashboards
๐Ÿชต Log ingestion
๐Ÿ’ก Pipelines, parsing and the Graylog information model
๐Ÿ‘๏ธ Dashboards and visualization
๐Ÿ”’ Intro to API security
โž• More!

Enroll here! โคต๏ธ
graylog.org/post/graylog-acade
#ITPro #SysAdmin #securityanalyst #cybersecurity #security

2025-07-12

Did you know that there is FREE online #Graylog analyst training? ๐Ÿ†“ Take a look at Graylog Academy! Designed from the ground up by internal Grayloggers and expertsโ€”anyone can sign up for Graylog Academy Training. ๐Ÿ’ฏ

Hereโ€™s some of what you can learn about:
๐Ÿ” Search Fundamentals
๐Ÿ“Š Introduction to Graylog Dashboards
๐Ÿชต Log Ingestion
โ„น๏ธ Pipelines, Parsing and Graylog Information Model
๐Ÿ‘๏ธ Dashboards and Visualization
โš ๏ธ Events, Alerts and Notifications
๐Ÿ” Intro to API Security
๐Ÿ‘‹ Interactive Tours

Wondering if Graylog Academy is right for you? This training is ideal for:
โœ”๏ธ IT pros
โœ”๏ธ #Security analysts
โœ”๏ธ System administrators
โœ”๏ธ Anyone interested in learning about log management & analysis

Enroll here! โคต๏ธ
graylog.org/post/graylog-acade #ITpro #sysadmin #securityanalyst #cybersecurity

2025-02-18

Over the past few years, #security analysts have worked together to combat threat actors by sharing information and strategies โ€” including the use of open source Sigma rules. ๐Ÿค”

Leveraging the capabilities of Sigma rules can help you optimize your centralized log management solution for security detection and response! ๐Ÿ’ก

Learn more about Sigma rules including:
โ“ Why you should use them
๐Ÿ“‚ Specific use cases
๐Ÿฆด The anatomy of a Sigma rule
๐Ÿ” Sigma rule event processing for advanced detection capabilities

graylog.org/post/the-ultimate- #threatactors #cybersecurity #securityanalyst

๐Ÿ‘€ Have you checked out #Graylog Academy? We've got dashboards, pipelines & parsingโ€”OH MY! So, if you're an #ITpro, #securityanalyst, #sysadmin or interested in learning about log management+analysisโ€”then this is for you. ๐Ÿ˜Š IT'S FREE.๐Ÿ˜ƒ Enroll now.๐Ÿ‘‡ graylog.org/post/graylog... #cybersecurity #infosec

Graylog Academy: Free On-Deman...

2024-11-25

Attn: Security Analysts... let's talk about what your Intrusion Detection System (IDS) and intrusion Prevention System (IPS) tools do, and how you can incorporate them into your network monitoring technology stack to improve network #security. ๐Ÿ’ช ๐Ÿ–ฅ๏ธ ๐Ÿ”’

In our latest blog, Jeff Darrington talks about the differences between IDS and IPS, risk-based event triage for reducing alert fatigue, and much more.

graylog.org/post/do-you-need-i #cybersecurity #infosec #networksecurity #securityanalyst #alertfatigue

Thor A. Hoplandhopland@snabelen.no
2024-10-02

Compared to "regular" #ComputerScience, I kind of suspect that #CyberSecurity is one of the harder things to do.

I'd like to become a #securityanalyst, but learning low level languages, assembly included, as well as knowing all the ways to test, poke and prod #software, #hardware, #protocols, #api, all while trying to find vulnerabilities through the eye of a needle...

It just gets harder with every year and you'll have to know what the heck you're doing...

But it's well paid, I hear.

ZPAZE by Gladius & Schildthezpaze
2024-05-03

Job Alert

Security Analyst at Wipro - Bengaluru

Experience - 0-1 year

Mode - On-site, Full-Time

ZPAZE by Gladius & Schildthezpaze
2024-04-19

Job Alert

Security Analyst at Unisys - Bengaluru

Experience - 3-5 years
Mode - On-site, Full-Time

2024-03-11

๐Ÿ† We're thrilled to announce our triumph at the Globee Awardsยฎ! ๐Ÿ† ๐ŸŽ‰

These awards highlight #Graylog's commitment to delivering a #security analyst experience that is not only top-notch but also remarkably user-friendly. ๐Ÿ‘‡

๐Ÿฅ‡ Gold Globee Winner for Security Information and Event Management (#SIEM)

๐Ÿฅ‡ Gold Globee Winner for Threat Hunting, Detection, Intelligence, and Response

๐Ÿฅˆ Silver Globee Winner for Application Programming Interface Management & Security

๐Ÿฅ‰ Bronze Globee Winner for Most Innovative Security Company of the Year โ€“ Security Software

We are honored to be acknowledged with these Globee Awards for our pioneering approach and exceptional capabilities. Learn more. โคต
graylog.org/award/graylog-clin #securityanalyst #cybersecurity #APIsecurity

2023-10-22

๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—–๐—ผ๐—ฝ๐—ถ๐—น๐—ผ๐˜?

"It is a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders to improve security outcomes at machine speed and scale, while remaining compliant to responsible AI principles."

The primary focus of the Early Access Program is centered around:

๐Ÿ“Œ๐—œ๐—ป๐—ฐ๐—ถ๐—ฑ๐—ฒ๐—ป๐˜ ๐—ฟ๐—ฒ๐˜€๐—ฝ๐—ผ๐—ป๐˜€๐—ฒ

๐Ÿ“Œ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฝ๐—ผ๐˜€๐˜๐˜‚๐—ฟ๐—ฒ ๐—บ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜

๐Ÿ“Œ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฟ๐—ฒ๐—ฝ๐—ผ๐—ฟ๐˜๐—ถ๐—ป๐—ด

"Here's an explanation of how Microsoft Security Copilot works:

โžก User prompts from security products are sent to Security Copilot.

โžกSecurity Copilot then pre-processes the input prompt through an approach called grounding, which improves the specificity of the prompt, to help you get answers that are relevant and actionable to your prompt. Security Copilot accesses plugins for pre-processing, then sends the modified prompt to the language model.

โžกSecurity Copilot takes the response from the language model and post-processes it. This post-processing includes accessing plugins to gain contextualized information.

โžกSecurity Copilot returns the response, where the user can review and assess the response."

learn.microsoft.com/en-us/secu

#microsoft #microsoftsecurity #securitycopilot #copilot #soc #incidentresponse #soc #analyst #securityanalyst #ai #artificialinteligence #generativeai #openai #azureopenai #llm #cybersecurity #defender #xdr #sentinel #intune #prompt #largelanguagemodel #llm #foundationalmodel #gpt4 #gpt3

2023-10-15

๐—จ๐—ป๐—น๐—ผ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ ๐—ผ๐—ณ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—œ๐—ป๐˜๐—ฒ๐—น๐—น๐—ถ๐—ด๐—ฒ๐—ป๐—ฐ๐—ฒ ๐˜„๐—ถ๐˜๐—ต ๐—”๐˜‡๐˜‚๐—ฟ๐—ฒ ๐—ข๐—ฝ๐—ฒ๐—ป๐—”๐—œ ๐—ฎ๐—ป๐—ฑ ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—œ๐—ป๐˜๐—ฒ๐—น๐—น๐—ถ๐—ด๐—ฒ๐—ป๐—ฐ๐—ฒ

I'm excited to share my recent side project! ๐Ÿ’ปโœจ

I've been exploring the incredible potential of a simple web app for engaging in conversations with threat intelligence data. In my case, I harnessed the power of Microsoft Defender Threat Intelligence.

All the details are in the following blog post:

medium.com/@antonio.formato/ch

I'd love to hear your thoughts and feedback.

This project has been an eye-opener for me, demonstrating how Generative AI can be a game-changer in the realm of cybersecurity. I hope it serves as a valuable starting point for other innovative applications in the cybersecurity space.

Let's connect and discuss how technology can empower us in the ever-evolving world of cybersecurity. ๐ŸŒ๐Ÿ›ก๏ธ

#azure #azureopenai #llm #chatbot #threatintelligence #ti #microsoft #microsoftdefenderthreatintelligence #mdti #cyber #cybersecurity #soc #threatactors #threatanalysis #ttp #ioc #securityanalyst #microsoftsecurity #largelanguagemodel #gpt4 #azurelogicapps #logicapps #cognitiveservices #dev #chat

Hey! Iโ€™m looking to add another member to my growing security operations team! If you are looking to help grow security operation processes and work to find evil with an awesome team and a great business, take a look!

recruiting.ultipro.com/CEN1011

#SecOps #SecurityAnalyst #FediHired #Security

2023-09-15

Imagine this. Youโ€™re a #SecurityAnalyst protecting the Black Hat network when suddenly you notice Autoit.F, a trojan youโ€™ve never seen before. What do you do next? In a new blog, Ben Reardon explains how he was able to detect, investigate, triage, and close this exact incident using @corelightโ€™s Open NDR Platform while serving in the NOC at #BlackHat. corelight.com/blog/blackhat-no

#Cybersecurity #CyberDefense #NetworkSecurity #DFIR

2023-08-25

๐—œ๐—ป๐˜๐—ฒ๐—ด๐—ฟ๐—ฎ๐˜๐—ถ๐—ป๐—ด ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐Ÿฏ๐Ÿฒ๐Ÿฑ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ถ๐—ป๐˜๐—ผ ๐˜†๐—ผ๐˜‚๐—ฟ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ผ๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€

The deployment and implementation of the Microsoft 365 Defender platform will need careful planning with the SOC team to optimize the day-to-day operations and lifecycle management of the Microsoft 365 Defender service itself.

This content explores several concepts on how to operationalize and integrate Microsoft 365 Defender with either new or existing people, processes, and technologies that form the basis for modern security operations.

Use these steps to integrate Microsoft 365 Defender into your SOC.

1๏ธโƒฃPlan for Microsoft 365 Defender operations readiness

2๏ธโƒฃPerform a SOC integration readiness assessment using the Zero Trust Framework

3๏ธโƒฃPlan for Microsoft 365 Defender integration with your SOC catalog of services

4๏ธโƒฃDefine Microsoft 365 Defender roles, responsibilities, and oversight

5๏ธโƒฃDevelop and test use cases

6๏ธโƒฃIdentify SOC maintenance tasks

learn.microsoft.com/en-us/micr

#m365defender #defender #microsoft #xdr #soc #zerotrust #azure #cloud #cloudsecurity #securityanalyst #mdo #mde #mdi #entraid #mdca

Tedi Heriyantotedi@infosec.exchange
2023-08-04

OSINT Toolkit is a full-stack web application designed to assist security analysts in their work: github.com/dev-lu/osint_toolki

#osint #SecurityAnalyst

2023-05-27

From zero to hero security coverage with Microsoft Sentinel for your critical SAP security signals.

"How the SOAR capabilities of Sentinel can be utilized in conjunction with SAP by leveraging Microsoft Sentinel Playbooks/Azure Logic Apps to automate remedial actions in SAP systems or SAP Business Technology Platform (BTP)"

blogs.sap.com/2023/05/22/from-

More info: techcommunity.microsoft.com/t5

#microsoft #azure #business #security #technology #sap #soar #sentinel #microsoftsentinel #siem #cloudnative #cloudsecurity #BusinessTechnologyPlatform #btp #erp #soc #detection #securityanalyst #playbook

2023-05-23

From zero to hero security coverage with Microsoft Sentinel for your critical SAP security signals.

"How the SOAR capabilities of Sentinel can be utilized in conjunction with SAP by leveraging Microsoft Sentinel Playbooks/Azure Logic Apps to automate remedial actions in SAP systems or SAP Business Technology Platform (BTP)"

blogs.sap.com/2023/05/22/from-

More info: techcommunity.microsoft.com/t5

#microsoft #azure #business #security #technology #sap #soar #sentinel #microsoftsentinel #siem #cloudnative #cloudsecurity #BusinessTechnologyPlatform #btp #erp #soc #detection #securityanalyst #playbook

2023-05-19

My Security team at #Plexure, in #Auckland, #NZ, is #hiring for a #SecurityAnalyst and #SecurityEngineer. We are a cloud-native organization that delivers APIs for some of the world's leading fast-food restaurants, and are looking for people with experience in #appsec, #compliance, #GDPR, and reviewing and improving security posture. #fedihire #hiring Security Analyst: plexure.breezy.hr/p/65e1bdf956
Security Engineer: plexure.breezy.hr/p/0229cfabdb

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst