AI Research Scientist
SIEM Tools:
Splunk
IBM QRadar
Microsoft Sentinel
EDR Tools:
CrowdStrike
Microsoft Defender for Endpoint
Network Monitoring Tools:
Wireshark
Suricata
Zeek (Bro)
Detecting anomalies in:
Login failures
Privilege escalations
Suspicious PowerShell/Bash activity
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.