Cybersecurity Threat Hunting

  • Home
  • Cybersecurity Threat Hunting
Cybersecurity Threat Hunting

This task leverages network sensors, software agents and cloud-based computing to collect and analyze system logs and network telemetry for indicators of compromise. The software agents are the same ones deployed in task 2.1.2 above.

Key phases of this task include:

  • Sensor Deployment – deploy a hardware sensor on customer’s primary network switch to monitor inbound and outbound network traffic
  • Log Collection – collect security logs and other pertinent metadata from customer`s computing systems and existing security solutions such as antivirus and firewall
  • Log Analysis – analyze the collected log data in the cloud using static signatures and machine learning techniques to identify active threats
  • Reporting – prepare detailed documentation of observed security incidents and recommendations on how to mitigate them


Related Posts

Cybersecurity Configuration Assessment

The Tabiri cyber security team leverages open-source software agents deployed on your Windows, Linux and

Read More

Cybersecurity Framework Assessment

Tabiri Analytics is conducting an assessment of existing cybersecurity programs at participating small- to medium-sized to

Read More

Cybersecurity Vulnerability Assessment

The Tabiri Analytics team will conduct controlled testing of the organization’s computing infrastructure. Testing simulates

Read More