Malware analysis
Imagine you've received a sample of a suspicious file identified on an endpoint within our network. As a SOC analyst, describe the practical steps you would take to analyze this potential malware. Discuss the tools and techniques you'd use, the indicators of compromise you'd look for, and how you would determine the extent of the infection. Additionally, highlight any collaboration with threat intelligence or other teams to enhance the overall malware detection and response capabilities. How would you train or mentor other team members in malware analysis?
Sènior
Seguretat cibernètica