Match Report

M.N. van de LaarCyber Security Analyst (SOC) at Unknown

Global Score

40%

Detailed Score

28%

Final Score

14%

Requirement Breakdown22

Security Analyst experience

must have
good match
57%
Matched with: Network Operations Center

Minimum 3 years experience as Security Analyst or SOC Analyst

Security Analyst experience

must have
good match
57%
Matched with: Network Operations Center

Minimum 3 years experience as Security Analyst or SOC Analyst

Threat intelligence knowledge

must have
no match
0%

Knowledge of threat intelligence (MITRE ATT&CK framework)

Network forensics experience

must have
no match
0%

Experience with network and endpoint forensics

Incident response procedures

must have
no match
0%

Familiarity with incident response procedures

CompTIA Security+ certification

must have
no match
0%

CompTIA Security+ or equivalent certification

SIEM systems experience

must have
no match
0%

Experience with SIEM systems (Microsoft Sentinel, Splunk, or QRadar)

SIEM systems experience

must have
no match
0%

Experience with SIEM systems (Microsoft Sentinel, Splunk, or QRadar)

Network forensics experience

must have
no match
0%

Experience with network and endpoint forensics

CompTIA Security+ certification

must have
no match
0%

CompTIA Security+ or equivalent certification

Threat intelligence knowledge

must have
no match
0%

Knowledge of threat intelligence (MITRE ATT&CK framework)

Incident response procedures

must have
no match
0%

Familiarity with incident response procedures

Malware analysis knowledge

nice to have
no match
0%

Knowledge of malware analysis (static and dynamic)

Kusto Query Language (KQL)

nice to have
no match
0%

Experience with Kusto Query Language (KQL) for Microsoft Sentinel

GCIH certification

nice to have
no match
0%

GCIH (GIAC Certified Incident Handler) certification

EDR tools experience

nice to have
no match
0%

Experience with EDR tools (CrowdStrike, Defender for Endpoint)

GCIH certification

nice to have
no match
0%

GCIH (GIAC Certified Incident Handler) certification

Threat hunting techniques

nice to have
no match
0%

Familiarity with threat hunting techniques

Malware analysis knowledge

nice to have
no match
0%

Knowledge of malware analysis (static and dynamic)

Threat hunting techniques

nice to have
no match
0%

Familiarity with threat hunting techniques

Kusto Query Language (KQL)

nice to have
no match
0%

Experience with Kusto Query Language (KQL) for Microsoft Sentinel

EDR tools experience

nice to have
no match
0%

Experience with EDR tools (CrowdStrike, Defender for Endpoint)