Professional Documents
Culture Documents
STS Security Porfolio and Capabilities
STS Security Porfolio and Capabilities
BEYOND
Cyber Security
The application of technologies, processes, and controls to protect systems, networks, programs, devices and data
from unauthorized exploitation and attacks.
Supports & SLA Sandboxing Database Security Web Application FW Patch Management
Security Operation
and Intelligence
SIP Security
Cyber Security
Team
Professional Skills Professional Skills Professional Skills Professional Skills Professional Skills Professional Skills
Cisco ASA, F5 ASM. ForcePoint Web Infoblox DNS
Cisco Sourcefire. IBM Qradar.
Cisco Firepower. FortiWeb. Security Firewall.
TrendMicro FortiSiem.
FortiGate. Barracuda. Cisco WSA
Tipping Point. Microfocus ArcSight
Force Point. Splunk
PaloAlto
Security
Mail Security
End-point NAC and Vulnerability Security
Security Management
Security Access Scanner Sandbox
Gateway
Control
Professional Skills Professional Skills Professional Skills Professional Skills Professional Skills Professional Skills
TrendMicro. Cisco ISE. Open VAS. Forti Sandbox.
FortiMail. FortiManager.
Kaspersky. Aruba ClearPass. Tripwire IP360. Trend Micro Deep
Cisco ESA. FortiAnalyzer.
Cisco AMP. Forti NAC Nessus Discovery (DDAN)
Barracuda. Cisco FMC.
Symantec Symantec.
Cisco CCIE Security. Cisco CCIE Security. Cisco CCIE Security. Cisco CCIE Security. Tripwire Enterprise Fortinet NSE7.
TrendMicro Hybrid Fortinet NSE6 Fortinet NSE4, NSE5, Fortinet NSE5 Foundation and TrendMicro Hybrid
Cloud Security. Barracuda Email. NSE7. Advance Cloud Security.
Aruba ACDP
Load Infosec
Balancers Certifications
Professional Skills
F5 LTM. SANS GCIA
Barracuda ADC. Elearn Security Malware Analysis
Forti ADC. Professional
SANS GCIH
Certificate of participation Security
Incident First Responder training
ISO 27001 Lead Implementer
Certifications Certification
eLearn Security Junior Penetration
Fortinet NSE6 Tester (eJPT) v1.0
Barracuda ADC EC-Council Certified Security
Analyst (ECSA) v10
Certified Ethical Hacker (CEH) v10
Event Correlation.
Able to perform field based search and keyword search.
Built in case management system.
Incidents are mapped to Mitre attack framework.
STS SOC Technology-Deliverables
Eye on screen by
Facilitate Threat Hunting & IOC
responding to opened
SOC Systems & Solution communication with tickets and security risk Security Incident
Lifecycle customers incidents. investigation
Use Case design
SIEM/Tools
Administration Inform customers IT Initial Threat Analysis Evaluate Impact
Validate escalations
Team to preform
Mitigation tasks
Management Sensor Root Cause analysis Manage incident
(Log Sources) Tuning False Positive to closure
Ensure deployment of response
mitigation tasks Suggest actions to
Deployment & ·Delivering SOC reports resolve incidents
Integration Service to customers Security Incident Ticket
creation Malware Analysis
Management
False Positive to closure
Document and transfer
Scripting & Automation customer needs to SOC
Build/Deploy Escalate to Tier2 Escalate to SOC Forensic Investigation
Team
Supervisor
STS SOC – Team Qualifications
GCIA, GCIH,
6-12 months Masters in Cisco Cyber 2 years of CEH, CHFI, 5 years of ECMAP, SIEM
experience Cybersecurity OPS experience ECIH experience advanced
analyst
STS Cybersecurity and SOC References
Presidency TRD
Commercial References