Match Report

Bora YildirimCyber Security Analyst (SOC) at Unknown

Global Score

47%

Detailed Score

69%

Final Score

69%

Requirement Breakdown22

SIEM systems experience

must have
strong match
77%
Matched with: SIEM

Experience with SIEM systems (Microsoft Sentinel, Splunk, or QRadar)

SIEM systems experience

must have
strong match
77%
Matched with: SIEM

Experience with SIEM systems (Microsoft Sentinel, Splunk, or QRadar)

Threat intelligence knowledge

must have
strong match
77%
Matched with: MITRE ATT&CK

Knowledge of threat intelligence (MITRE ATT&CK framework)

Threat intelligence knowledge

must have
strong match
77%
Matched with: MITRE ATT&CK

Knowledge of threat intelligence (MITRE ATT&CK framework)

CompTIA Security+ certification

must have
strong match
74%
Matched with: Security+

CompTIA Security+ or equivalent certification

CompTIA Security+ certification

must have
strong match
74%
Matched with: Security+

CompTIA Security+ or equivalent certification

Incident response procedures

must have
strong match
73%
Matched with: Incident Response

Familiarity with incident response procedures

Incident response procedures

must have
strong match
73%
Matched with: Incident Response

Familiarity with incident response procedures

Network forensics experience

must have
good match
63%
Matched with: Incident Response

Experience with network and endpoint forensics

Network forensics experience

must have
good match
63%
Matched with: Incident Response

Experience with network and endpoint forensics

Security Analyst experience

must have
good match
58%
Matched with: SIEM

Minimum 3 years experience as Security Analyst or SOC Analyst

Security Analyst experience

must have
good match
58%
Matched with: SIEM

Minimum 3 years experience as Security Analyst or SOC Analyst

EDR tools experience

nice to have
strong match
77%
Matched with: CrowdStrike

Experience with EDR tools (CrowdStrike, Defender for Endpoint)

EDR tools experience

nice to have
strong match
77%
Matched with: CrowdStrike

Experience with EDR tools (CrowdStrike, Defender for Endpoint)

Malware analysis knowledge

nice to have
strong match
74%
Matched with: Malware Analysis

Knowledge of malware analysis (static and dynamic)

Malware analysis knowledge

nice to have
strong match
74%
Matched with: Malware Analysis

Knowledge of malware analysis (static and dynamic)

GCIH certification

nice to have
good match
60%
Matched with: Incident Response

GCIH (GIAC Certified Incident Handler) certification

GCIH certification

nice to have
good match
60%
Matched with: Incident Response

GCIH (GIAC Certified Incident Handler) certification

Threat hunting techniques

nice to have
good match
57%
Matched with: Malware Analysis

Familiarity with threat hunting techniques

Threat hunting techniques

nice to have
good match
57%
Matched with: Malware Analysis

Familiarity with threat hunting techniques

Kusto Query Language (KQL)

nice to have
no match
0%

Experience with Kusto Query Language (KQL) for Microsoft Sentinel

Kusto Query Language (KQL)

nice to have
no match
0%

Experience with Kusto Query Language (KQL) for Microsoft Sentinel