They analyze logs from IDS/IPS, firewall s, proxies. anti-virus and end-point protection, servers, and workstations. These experts are called upon to assess the security impact of security alerts and traffic anomalies to be able to gather a wide perspective of the overall risk profile of enterprises.
They analyze potential cyber threats from a variety of intakes taking appropriate response actions to include threat containment and/or escalation. They process tactical mitigations based on results of analysis and determination of threat validity, and are adept at using security tools and technologies to analyze potential threats to determine impact, scope, and recovery.
Our malware experts team with attorneys and insurance investigators to examine high-impact breaches, malware infections, attempts at high profile phishing, and social engineering.
They have worked in a Security Operations Center (SOC) or threat monitoring environment with experience working with SIEM technologies and threat monitoring procedures.
They have held positions such as Incident Response Analyst, Analyst, Threat Monitoring Analyst, and Malware Analyst.
If you are unable to locate the right expert in our group, please contact us. We provide each client with a free initial consultation before the expert in question is retained, so you can make an informed decision without commitment. Let us connect you with a trusted and credible malware expert witness today.