You will get use cases for SIEM (SOC) Monitoring on DB, Application, ERP and OS layer

You will get use cases for SIEM (SOC) Monitoring on DB, Application, ERP and OS layer

Project details
In domain of SOC/SIEM , use-cases provide critical alerting capabilities on application, DB, OS and ERP to security analyst, which increase their threat hunting capabilities, the use-cases provided have been research and tailored most suited with your SIEM platform and each use-case is divided across following sections
Visibility
External Attacks
Internal Attack
Visibility
Affected Areas
Policy Violations
Operations
Legal
Each use-case is further divided into 3 level of indentation into :-
Goal
Sources
Requirements
Auditing to Event-ID Mapping
Troubleshooting
Dependency
Limitations
Affected Area
References
These use-case have been designed after careful research into risk into different domains Networks, Application and System. During the time of SOC/SIEM design, lot of work is put in doing research for various audit configuration of various IT / network/ security devices in network.
These out of box SIEM use-cases and designed in manner where the user can easily customize to his own SOC/SIEM environment
Visibility
External Attacks
Internal Attack
Visibility
Affected Areas
Policy Violations
Operations
Legal
Each use-case is further divided into 3 level of indentation into :-
Goal
Sources
Requirements
Auditing to Event-ID Mapping
Troubleshooting
Dependency
Limitations
Affected Area
References
These use-case have been designed after careful research into risk into different domains Networks, Application and System. During the time of SOC/SIEM design, lot of work is put in doing research for various audit configuration of various IT / network/ security devices in network.
These out of box SIEM use-cases and designed in manner where the user can easily customize to his own SOC/SIEM environment
Cybersecurity Expertise
Data Protection, Audit, Risk AssessmentTechnology Type
Firewall, Computer Network, Database, Operating System, SaaS, CRM, Email System, ERPCybersecurity Regulation
GDPR, ISO, NIST Cybersecurity Framework, SOC 2What's included $650
These options are included with the project scope.
$650
- Delivery Time 15 days
- Implementation
About zeeshan
Zeeshan Satti, CISSP | OSCP | CISA | MCSE | CDFE | CCNP | ISO27001LA
Doha, Qatar - 8:45 pm local time
About 8 years of acquaintance (Big4 experience) in managing Information Systems Security audits by way of assessing risk, determining controls, performing controls testing and thus checking for compliance;
Skill Set:
Security and Risk Management,
Assets Security,
Security Engineering,
Communication and Network Security,
Identify and access Management,
Security Operations,
Software Development Security
Penetration Testing, Incident Response, Risk Management, Malware Forensics, Vulnerability Assessment, DLP (Data Leakage Prevention), Firewalls, Implement network security, Email Security.
Hold numerous industry certifications including CISSP, OSCP, CISA, CDFE, CEHv9, CCNP R&S, CREST CSPA, CCNA, MCSE, MS, ITIL, MCITP, MCTP,MCSE cloud, eCPPT, ISO 27001 LA, CDFE, AZ900, AZ104 and CREST Certified Penetration Tester.
Steps for completing your project
After purchasing the project, send requirements so zeeshan can start the project.
Delivery time starts when zeeshan receives requirements from you.
zeeshan works on your project following the steps below.
Revisions may occur after the delivery date.
Define the target SOC/SIEM environment
I will send the Initial draft from either Network, Application or System domain
Review initial draft
You can pay for add-on in order for me to change documentation configuration details w.r.t to their env.