Activity: Cyber Security Operations Centre Monitoring and Analysis
Responsibilities and Accountabilities:
- Monitor Cyber Security events from various sources, including, but not limited to, Security Information and Event Management systems, Intrusion Detection Systems/ Intrusion Prevention Systems network monitoring tools and log files analysis, check for potential issues to ensure that potential malicious activities are mitigated or prevented.
- Triage Alerts that are triggered by the Security Information and Event Management systems before they are raised to Tier-2 analysts to ensure that that Tier-2 analysts have enough information to further investigate events.
- Investigate indicator of compromise in log management and security controls received by external and third-party advisories to ensure emerging threats are detected.
Activity: Alerts Investigation
Responsibilities and Accountabilities:
- Perform an initial investigation and correlation of events triggered in the Security Information and Event Management systems and other tools within the Cyber Security Operations Centre to identify possible security threats to the environment.
- Identify non-malicious false alerts and work with other stakeholders to exclude them from being triggered in the
- future.
- Asses and/or escalate the alerts raised by the tooling within in the time set by the applicable Service-Level Agreement (SLA).
Activity: Security Triage
Responsibilities and Accountabilities:
- Extract artefacts of interest from log data and examine them, recording all relevant information in a Security Incident ticket to make sure that the Tier-2 analyst has all the information to efficiently and effectively assess the potential incident.
- Escalate alerts raised by the Security Information and Event Management systems, into potential Incidents, to Tier-2 analysts for confirmation