Работа с SIEM-системами: анализ корреляции событий, enrichment security events, IOC correlation, ATT&CK mapping, выявление аномалий, анализ gaps в visibility инфраструктуры.
Анализ telemetry data из: SIEM, EDR/XDR, network telemetry, authentication logs, centralized logging systems.
Проведение hypothesis-driven threat hunting на основе: ATT&CK, IOC, telemetry, anomalous behavior, attacker TTP.
Использование Threat Intelligence для: enrichment, IOC correlation, ATT&CK mapping, detection improvement.
Анализ сетевого трафика и telemetry data с использованием: Wireshark, tcpdump, NetFlow/sFlow, Zeek или аналогичных инструментов.
Участие в процессе Vulnerability Management в части: attack surface analysis, externally exposed services, exploitation visibility, threat exposure analysis.
Контроль и анализ: security visibility, uncontrolled infrastructure zones, detection blind spots, telemetry gaps.
Разработка и сопровождение: detection standards, monitoring use-cases, incident investigation procedures, detection recommendations.