Hi Prabh sir, You can refer below point during interview for Specialist/Lead Security Analyst (L2 or L3 ) Make please video on It(Subject "Lead security analyst interview preparation"), 1- sir Ask some Real Time Use cases to explain End to End in project done 2- What where the Issues Faced & how come he eradicate those in project 3-How do you create usecase & how to write correlation Rules in SIEM Tool. 4- what are difficulties during implementing the SIEM tool & Executing use Case in them 5- Being Lead how does he handle the team & Assign the work to Teammates 6- one Big challenge faced being Lead & how Resolved it(In Threat Hunting & in incident response process) 7- what where the Problems Faced while Threat Hunting & Incident Response in Project, How do you overcome those 8-Being Lead How does "Threat Model Framework does he choose & what are the parameters" 9-What where the Issues Faced during MITER ATTACK implementation In project & Being Lead how he implemented changes to get excuted in process 10- Being Lead what are Advantages of AI in cyber security & how to make sure use of it in day to day work process 11- How AI is Dangerous to cyber security & what are the Replication during In work Environment Some more sample Questions you can add from your End during Interviewing the process.
*Sharing and using threat intelligence data must be done within legal boundaries to avoid potential legal issues, and ensure ethical and responsible information sharing.
Thank you so much for the detailed information. It will really help me to build Threat Intel from 0 .
Hi Prabh sir,
You can refer below point during interview for Specialist/Lead Security Analyst (L2 or L3 )
Make please video on It(Subject "Lead security analyst interview preparation"),
1- sir Ask some Real Time Use cases to explain End to End in project done
2- What where the Issues Faced & how come he eradicate those in project
3-How do you create usecase & how to write correlation Rules in SIEM Tool.
4- what are difficulties during implementing the SIEM tool & Executing use Case in them
5- Being Lead how does he handle the team & Assign the work to Teammates
6- one Big challenge faced being Lead & how Resolved it(In Threat Hunting & in incident response process)
7- what where the Problems Faced while Threat Hunting & Incident Response in Project, How do you overcome those
8-Being Lead How does "Threat Model Framework does he choose & what are the parameters"
9-What where the Issues Faced during MITER ATTACK implementation In project & Being Lead how he implemented changes to get excuted in process
10- Being Lead what are Advantages of AI in cyber security & how to make sure use of it in day to day work process
11- How AI is Dangerous to cyber security & what are the Replication during In work Environment
Some more sample Questions you can add from your End during Interviewing the process.
Very thorough, thanks a lot!
Nice information video sir
*Sharing and using threat intelligence data must be done within legal boundaries to avoid potential legal issues, and ensure ethical and responsible information sharing.
Can you share link documents on part 1 and part 2