Cybersecurity Threat Hunting

  • Home
  • Cybersecurity Threat Hunting
Cybersecurity Threat Hunting

This task leverages network sensors, software agents and cloud-based computing to collect and analyze system logs and network telemetry for indicators of compromise. The software agents are the same ones deployed in task 2.1.2 above.

Key phases of this task include:

  • Sensor Deployment – deploy a hardware sensor on customer’s primary network switch to monitor inbound and outbound network traffic
  • Log Collection – collect security logs and other pertinent metadata from customer`s computing systems and existing security solutions such as antivirus and firewall
  • Log Analysis – analyze the collected log data in the cloud using static signatures and machine learning techniques to identify active threats
  • Reporting – prepare detailed documentation of observed security incidents and recommendations on how to mitigate them

 

Related Posts

Cybersecurity Framework Assessment

Tabiri Analytics is conducting an assessment of existing cybersecurity programs at participating small- to medium-sized to

Read More

Cybersecurity Vulnerability Assessment

The Tabiri Analytics team will conduct controlled testing of the organization’s computing infrastructure. Testing simulates

Read More

Real time Cybersecurity Continuous Monitoring

The Tabiri Analytics team will collect and analyze various network telemetry and system logs for

Read More