Threat Hunting
Describe a real or hypothetical scenario where you've identified an anomaly during threat hunting. What specific steps would you take to investigate this potential threat? How did you prioritize and manage the workload during this situation? Highlight the tools, techniques, and collaboration methods you'd employ to validate and respond to the suspicious behavior within our SOC environment.
Confirmé·e
Cybersécurité