top of page

Cyber
security

CYBER SECURITY

Nowadays, attention to cybersecurity is no longer a choice but an absolute necessity. It is not a question of whether one will have to deal with a security incident, but when. That is why preventive monitoring of activities across the various systems is essential, especially in the world of cybersecurity. Prevention is better than cure.

The question is not if you will ever experience a security incident, but when .

Security Operations Center (SOC) analysts are indispensable in this preventive approach. They are responsible for continuously monitoring logs and analysing daily alerts, carefully assessing the relevance and urgency of each notification. In addition, they play a crucial role in identifying weaknesses in security systems and proposing optimisations.

Our SOC analysts can be deployed at companies with their own SOCs and organisations that offer these services to third parties. They have at least a bachelor's degree in IT (or equivalent) and extensive knowledge and interest in networks.

toreon_logo_wordmark copy.png

With Toreon NV as a training partner, Passwerk offers specialised training. This culminates in the certification path Cybrary SOC Analyst Level 1 & 2.

CORE RESPONSIBILITIES

​Our Level 1 & 2 SOC analysts can be deployed in both companies with their own SOC and organisations that offer these services to third parties. They have at least a bachelor's degree in IT (or equivalent) and have extensive knowledge and network interest.

Daily Tasks 

  • Analysing daily security alerts using a SIEM and performing triage.

  • Reviewing and fine-tuning alerts to reduce noise from false positives.

  • Monitoring and configuring security monitoring tools.

  • Conducting threat and vulnerability analysis.

Areas of Expertise & Programs

  • Threat Intelligence

  • Splunk

  • Network Monitoring

  • Vulnerability Scanning

  • Alert Tuning

  • Network Security

Additional Responsibilities (if your organisation does not have its own SOC)

  • Managing IAM and PAM systems.

  • Analysing suspicious emails and user behaviour.

  • Following up on phishing campaigns.

  • Optimising playbooks.

  • Preparing monthly reports.

  • Checking critical security updates for servers and endpoint devices.

  • Etc.

bottom of page