RAG, ICL, and Windows Events: Building a Human-Guided Security Analyst: https://jonny-johnson.medium.com/rag-icl-and-windows-events-building-a-human-guided-security-analyst-395faa6769a4
RAG, ICL, and Windows Events: Building a Human-Guided Security Analyst: https://jonny-johnson.medium.com/rag-icl-and-windows-events-building-a-human-guided-security-analyst-395faa6769a4
AI is becoming central to security operations. Let's talk about why. ๐
AI-assisted workflows are on the rise. โฌ๏ธ And, when an algorithm highlights a critical #security event, analysts need to understand why that happened. Without true visibility, this #AI assistance risks creating new blind spots and hiding important context, rather than leading to a solution. ๐
To make sense of the constant overflow of alerts, you need AI capabilities that are built into workflows that you already use, like:
โ๏ธ Behavioral detection
โ๏ธ Risk-based prioritization
โ๏ธ Investigation summaries
โ๏ธ Smarter dashboards and search
Learn how you can leverage these important AI capabilities and stay in control while using tools that accelerate detection, streamline investigations, and strengthen your reporting: https://graylog.org/post/how-graylog-uses-explainable-ai-to-help-security-teams/ #cybersecurity #securityops #security #securityanalyst
๐ Hey IT pros, security analysts, and sys admins! Have you taken advantage of #graylog's FREE analyst training, yet? The Graylog Academy is here for you. ๐ซต It's designed from the ground up by internal Grayloggers and experts, and anyone can sign up for it. ๐
This comprehensive on-demand training program covers a wide range of topics, ensuring participants gain a deep understanding of the platform and its capabilities. And for every test you pass you get a Graylog certificate! ๐
Learn about:
๐ Search fundamentals
๐ Graylog dashboards
๐ชต Log ingestion
๐ก Pipelines, parsing and the Graylog information model
๐๏ธ Dashboards and visualization
๐ Intro to API security
โ More!
Enroll here! โคต๏ธ
https://graylog.org/post/graylog-academy-free-training-available/
#ITPro #SysAdmin #securityanalyst #cybersecurity #security
Did you know that there is FREE online #Graylog analyst training? ๐ Take a look at Graylog Academy! Designed from the ground up by internal Grayloggers and expertsโanyone can sign up for Graylog Academy Training. ๐ฏ
Hereโs some of what you can learn about:
๐ Search Fundamentals
๐ Introduction to Graylog Dashboards
๐ชต Log Ingestion
โน๏ธ Pipelines, Parsing and Graylog Information Model
๐๏ธ Dashboards and Visualization
โ ๏ธ Events, Alerts and Notifications
๐ Intro to API Security
๐ Interactive Tours
Wondering if Graylog Academy is right for you? This training is ideal for:
โ๏ธ IT pros
โ๏ธ #Security analysts
โ๏ธ System administrators
โ๏ธ Anyone interested in learning about log management & analysis
Enroll here! โคต๏ธ
https://graylog.org/post/graylog-academy-free-training-available/ #ITpro #sysadmin #securityanalyst #cybersecurity
Over the past few years, #security analysts have worked together to combat threat actors by sharing information and strategies โ including the use of open source Sigma rules. ๐ค
Leveraging the capabilities of Sigma rules can help you optimize your centralized log management solution for security detection and response! ๐ก
Learn more about Sigma rules including:
โ Why you should use them
๐ Specific use cases
๐ฆด The anatomy of a Sigma rule
๐ Sigma rule event processing for advanced detection capabilities
https://graylog.org/post/the-ultimate-guide-to-sigma-rules/ #threatactors #cybersecurity #securityanalyst
Attn: Security Analysts... let's talk about what your Intrusion Detection System (IDS) and intrusion Prevention System (IPS) tools do, and how you can incorporate them into your network monitoring technology stack to improve network #security. ๐ช ๐ฅ๏ธ ๐
In our latest blog, Jeff Darrington talks about the differences between IDS and IPS, risk-based event triage for reducing alert fatigue, and much more.
https://graylog.org/post/do-you-need-ids-and-ips/ #cybersecurity #infosec #networksecurity #securityanalyst #alertfatigue
Compared to "regular" #ComputerScience, I kind of suspect that #CyberSecurity is one of the harder things to do.
I'd like to become a #securityanalyst, but learning low level languages, assembly included, as well as knowing all the ways to test, poke and prod #software, #hardware, #protocols, #api, all while trying to find vulnerabilities through the eye of a needle...
It just gets harder with every year and you'll have to know what the heck you're doing...
But it's well paid, I hear.
Job Alert
Security Analyst at Wipro - Bengaluru
Experience - 0-1 year
Mode - On-site, Full-Time
Job Alert
Security Analyst at Unisys - Bengaluru
Experience - 3-5 years
Mode - On-site, Full-Time