Page 9 - Cyber Warnings
P. 9







Alert analysts should be given playbooks and procedures to decide on the priority and
assignment of alerts.


Incident Responder:

 Performs deep incident analysis by correlating data received from the Alert
Analyst and other sources
 Identifies if a critical system or data set has been impacted and recommends
solutions
 Collects and correlates threat intelligence related to the incident and uses the
data to investigate
 Assists in decision making using different types of software, e.g. phishing,
malware and ransomware.

The Incident Responder should be trained in advanced network forensics, host-based
forensics, incident response procedures, malware assessment, network forensics, log
reviews and threat intelligence.


Subject Matter Expert:

 Proactively searches for breaches in order to avoid escalated incidents
 Conducts deeper analysis on complex incidents including malware reversing, log
analytics, forensics and response planning
 Contributes to developing, tuning and implementing threat detection analytics

The Subject Matter Expert possesses in-depth knowledge of network, endpoint, threat
detection, forensics, malware reverse engineering, data aggregation and the functioning
of specific applications or underlying IT infrastructure.


SOC Manager:

 Directs the SOC and provides input to the company’s larger security strategy,
serving as organizational point person for business-critical incidents
 Prioritizes tasks in order to detect, investigate and mitigate incidents that could
impact the business
 Creates a workflow model and ensures that reporting and documentation are
maintained accordingly
 Implements standardized operating procedures (SOPs) for handling incidents to
guide analysts through the triage and response processes
 Manages resources, personnel, budget and scheduling to meet SLAs






9 Cyber Warnings E-Magazine – May 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   4   5   6   7   8   9   10   11   12   13   14