You will get use cases for SIEM (SOC) Monitoring on DB, Application, ERP and OS layer

zeeshan s.
zeeshan s.

Let a pro handle the details

Buy Cybersecurity & Data Compliance Services services from zeeshan, priced and ready to go.

You will get use cases for SIEM (SOC) Monitoring on DB, Application, ERP and OS layer

zeeshan s.
zeeshan s.

Let a pro handle the details

Buy Cybersecurity & Data Compliance Services services from zeeshan, priced and ready to go.

Project details

In domain of SOC/SIEM , use-cases provide critical alerting capabilities on application, DB, OS and ERP to security analyst, which increase their threat hunting capabilities, the use-cases provided have been research and tailored most suited with your SIEM platform and each use-case is divided across following sections

Visibility
External Attacks
Internal Attack
Visibility
Affected Areas
Policy Violations
Operations
Legal

Each use-case is further divided into 3 level of indentation into :-

Goal
Sources
Requirements
Auditing to Event-ID Mapping
Troubleshooting
Dependency
Limitations
Affected Area
References

These use-case have been designed after careful research into risk into different domains Networks, Application and System. During the time of SOC/SIEM design, lot of work is put in doing research for various audit configuration of various IT / network/ security devices in network.

These out of box SIEM use-cases and designed in manner where the user can easily customize to his own SOC/SIEM environment
Cybersecurity Expertise
Data Protection, Audit, Risk Assessment
Technology Type
Firewall, Computer Network, Database, Operating System, SaaS, CRM, Email System, ERP
Cybersecurity Regulation
GDPR, ISO, NIST Cybersecurity Framework, SOC 2

What's included $650

These options are included with the project scope.

$650
  • Delivery Time 15 days
    • Implementation
zeeshan s.

About zeeshan

zeeshan s.
Zeeshan Satti, CISSP | OSCP | CISA | MCSE | CDFE | CCNP | ISO27001LA
Doha, Qatar - 8:45 pm local time
A passionate Security, Network and Audit professional who always enjoys new challenges and focus on continuous process improvement, service in the community and constant acquisition of relevant, applicable skills.

About 8 years of acquaintance (Big4 experience) in managing Information Systems Security audits by way of assessing risk, determining controls, performing controls testing and thus checking for compliance;

Skill Set:

Security and Risk Management,
Assets Security,
Security Engineering,
Communication and Network Security,
Identify and access Management,
Security Operations,
Software Development Security

Penetration Testing, Incident Response, Risk Management, Malware Forensics, Vulnerability Assessment, DLP (Data Leakage Prevention), Firewalls, Implement network security, Email Security.

Hold numerous industry certifications including CISSP, OSCP, CISA, CDFE, CEHv9, CCNP R&S, CREST CSPA, CCNA, MCSE, MS, ITIL, MCITP, MCTP,MCSE cloud, eCPPT, ISO 27001 LA, CDFE, AZ900, AZ104 and CREST Certified Penetration Tester.

Steps for completing your project

After purchasing the project, send requirements so zeeshan can start the project.

Delivery time starts when zeeshan receives requirements from you.

zeeshan works on your project following the steps below.

Revisions may occur after the delivery date.

Define the target SOC/SIEM environment

I will send the Initial draft from either Network, Application or System domain

Review initial draft

You can pay for add-on in order for me to change documentation configuration details w.r.t to their env.

Review the work, release payment, and leave feedback to zeeshan.